Sophisticated Malvertising Campaign Involves 10,000 WordPress Sites

  /     /     /  
Publicated : 23/11/2024   Category : security


Sophisticated Malvertising Campaign Involves 10,000 WordPress Sites


A CheckPoint study has uncovered a complex malvertising schemes that involves more than 10,000 WordPress-hosted sites, and an ecosystem of ad-networks and resellers.



Malvertising is a well-known and long-standing security problem for the web. Advertisements that have malicious purpose have afflicted any number of different web browsers for years after an attack.
However, the methods behind these campaigns are much more sophisticated than most realize.
A recent report by CheckPoint
describes an entire ecosystem that monetizes the efforts behind these ads. As the researchers put it: It starts with compromised WordPress websites, involves multiple parties in the online advertising chain and ends with distributing malicious content.
This all starts with the threat actor or actors that CheckPoint calls Master134, which is named after the command-and-control server at the heart of the scheme.
An overview of Master123s malvertising pperation

(Source:
CheckPoint
)
First, CheckPoint found over 10,000 WordPress CMS version 4.7.1 sites that were compromised through exploitation of a known remote code execution vulnerability. Ads -- or other malware -- were injected that redirected users to a controlled portal.
From here, it all gets interesting.
Master134 then masquerades as a publisher in the AdsTerra advertising network. These networks sell ad slots to other resellers that deal directly with the ad buyers.
Interestingly, CheckPoint found that AdsTerra, which based in Cyprus, had been previously involved in the
Magnitude Exploit Kit
infection chain.
AdsTerra will sell the slots to the highest bidder, such as ExoClick, AdKernel, EvoLeads and AdventureFeeds.
By some coincidence, Master134s slots sold through these resellers all ended up hosting malware. Threat actors can offer high bids for the slots to the resellers -- when compared to other advertisers -- because their ill-gotten gains roll in fast.
Some of the malicious ads that have shown up in the slots include campaigns for Fobos, HookAds, Seamless, BowMan, TorchLie, BlackTDS and Slyip, which will redirect to the RIG Exploit Kit. (See
RIG Exploit Kit Injects Code That Creates Monero Miner
.)
In addition, redirections to Magnitude Exploit Kit, GrandSoft Exploit Kit, FakeFlash and technical support scams have been found by CheckPoint.
So it seems that threat actors seeking traffic for their campaigns simply buy ad space from Master134 through several ad-networks and, in turn, Master134 indirectly sells traffic and victims to these campaigns.
There is some form of a plausible deniability gained by everyone involved in the chain.
However, ClickPoint believes that the money flow works differently. Researchers suspect that Master134 gets paid from the threat actors and then launders it through the ad networks.
Zero in on the most attractive 5G NR deployment strategies, and take a look ahead to later technology developments and service innovations. Join us for the
Deployment Strategies for 5G NR breakfast workshop
in LA at MWCA on September 12. Register now to learn from and network with industry experts – communications service providers get in free!
As the research note describes:

Speculate that the threat actors pay Master134 directly. Master134 then pays the ad-network companies to re-route and perhaps even disguise the origins of the traffic. In such a scenario, Master134 plays a unique role in the cybercrime underworld; he is generating profit from ad revenue by working directly with AdsTerra and is successfully making sure this traffic reaches the right, or in our case -- the wrong hands.

What this shows is that threat actors are gaining sophistication in their operations. Besides obfuscating the exploit code, they are hiding the monetization process from prying eyes. They hope to use methods used by normal businesses to hide their crime.
Real-time ad buying is a very mechanized process. Ascertaining the use intent of an ad buyer is impossible right now, because humans never touch the process. That may have to change.
Related posts:
Kronos Returns as Banking Trojan Attacks Ramp Up
Cryptomining Malware, Cryptojacking Remain Top Security Threats
Trend Micro Finds 89 Malicious Chrome Extensions Dispensing Malvertising
Adware & Cryptomining Remain Top Enterprise Security Threats
— Larry Loeb has written for many of the last centurys major dead tree computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Last News

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security

▸ Senate wants changes to cybercrime law. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Sophisticated Malvertising Campaign Involves 10,000 WordPress Sites