Attacker Expands Use of Malicious SEO Techniques to Distribute Malware

  /     /     /  
Publicated : 23/11/2024   Category : security


Attacker Expands Use of Malicious SEO Techniques to Distribute Malware


The operators of REvil and Gootkit have begun using a tried and tested technique to distribute additional malware, Sophos says.



An innovative method that the operators of the REvil ransomware strain and the Gootkit banking Trojan have been using for years to distribute their malware is now being used to deliver other malware as well, including the Kronos Trojan and the Cobalt Strike attack kit.
Researchers from Sophos who have been tracking the threat have dubbed the delivery mechanism Gootloader. In a new report, they described the method as deserving close scrutiny for the manner in which it leverages malicious search engine optimization (SEO) techniques as part of the malware deployment process.
The method basically involves the attackers maintaining a fairly large network of servers hosting legitimate but previously compromised websites. In each instance, the attackers exploit vulnerabilities in the websites content management system to essentially inject a mostly unintelligible collection of words and phrases — commonly referred to as a word salad.
The goal is to fool search engines into thinking a compromised website is about those words, when in reality it might be about something else entirely, says Chester Wisniewski, principal research scientist at Sophos. For example, one compromised website that Sophos observed being used in the Gootkit campaign belonged to a neonatal clinic in Canada. Because of the random collection of words and phrases that had been inserted into it, the site appeared as the top link in Google search results in response to a query about a very narrow type of real estate agreement.
Maybe you search for connect Bluetooth toothbrush to Motorola Android phone, Wisniewski explains by way of an example. It just so happens that the criminals had compromised an insecure WordPress site last week and amongst the word salad they injected were words like Motorola, Android, and toothbrush, he says. Google gets tricked into thinking the site is an expert on the topic and serves up the page as a top link in search results.
Because the result seems to match the original search query exactly, the user gets fooled into clicking on the link and ends up being directed to what appears to be a forum page on the compromised website, where people are seemingly discussing the identical topic. On the webpage is a download link, apparently posted by the forum administrator, to a document purporting to contain the answer to the users search query. The link, too, contains the exact search terms and in the same order as used in the original search query. Users that click on the link end up downloading a ZIP file — again with the same search terms—containing a malicious JavaScript that is disguised to look like a document. You open the document and run the JavaScript, which infects your PC, Wisniewski says.
Constructing Payloads on the Fly
The JavaScript file is the only stage of the attack chain where a malicious file is written to the filesystem, according to the
report
. Every other malicious activity that is initiated after the script runs happens in memory and out of sight of most endpoint protection tools, the vendor notes.
The security vendors analysis of Gootloader shows the mechanism is designed to serve up the fake forum page only to users who arrive at a compromised website by following a Google search result. The Gootloader process also determines whether the site visitors computer is running an operating system with the specific language and geolocation preferences that the attackers are targeting. If any of these conditions are not met, the fake forum page is not served up to someone who ends up on the compromised website.
The adversaries have developed a method where the site from which the malicious file is downloaded is able to construct payloads on the fly with a file name that matches the original search query, Sophos says. The company found that users were searching for things as random as Cisco WPA agreement and employee retention bonus agreement template when they were presented with links to a compromised website purporting to have an answer to their specific query.
Sophos says the infection method appears to target only users conducting searches on Google. It also appears to mostly work for search types where there isnt a clearly credible expert page to send users to, Wisniewski adds. Its very difficult to trick Google about Donald Trump or Watergate, he notes. So, many of the searches where users end up on a compromised site are for odd combinations of generic things. This is why the word salad approach works so well, he says.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Attacker Expands Use of Malicious SEO Techniques to Distribute Malware