Security

Research

BlackCat plays with malvertising traps to lure corporate victims

Ads for Slack and Cisco AnyConnect actually downloaded Nitrogen malware


Updated Affiliates of the ALPHV/BlackCat ransomware-as-a-service operation are turning to malvertising campaigns to establish an initial foothold in their victims' systems.

Paid adverts for popular business software such as Slack and Cisco AnyConnect are being used to lure corporate victims into downloading malware that in turn leads to ransomware deployment.

Rather than downloading the legitimate software, victims are instead infected with Nitrogen malware – an initial access payload that can be used to launch second-stage attacks, akin to the the deployment of ransomware.

eSentire's Threat Response Unit (TRU) says it was engaged after affiliates of the ransomware group targeted its customers on multiple occasions.

The Nitrogen malware campaign was first observed in June, but the tactic of malvertising associated with Nitrogen is new.

"Nitrogen is initial-access malware that leverages Python libraries for stealth," says Keegan Keplinger, senior threat intelligence researcher with TRU in its report. "This foothold provides intruders with an initial entry into the target organization's IT environment.

"Once the hackers have that initial foothold, they can then infect the target with the malware of their choosing. In the case with this attack campaign, the target victims are being infected with the ALPHV/BlackCat ransomware."

Using Python libraries allows attackers to more easily blend into an organization's normal traffic patterns since they are so ubiquitous. Added obfuscation techniques further delay defenders from spotting malicious activity.

eSentire says it stopped the BlackCat ransomware attack before it unfolded, but the company has a special resentment for the group owing to its previous, "despicable" methods.

Not only is the group known for its willingness to target victims in the healthcare sector, activity that's considered off-limits even for some criminals, in July it also tried to extort one healthcare network by posting topless images of breast cancer patients. The same tactic was repeated recently by the Hunters International group.

Among its other major scalps claimed this year are social media giant Reddit, Seiko Group, and Barts Health NHS Trust – the latter another example of healthcare attacks.

The group has also shown its continued ambition to evolve and strengthen over time. It recently broke its rule on partnering with English-speaking cybercriminals after welcoming Octo Tempest into its affiliate program.

Octo Tempest's expertise in SIM swapping, SMS phishing, and advanced English-speaking social engineering campaigns was enough to seduce BlackCat, supposedly with a view to opening up its pool of potential targets.

Malvertising scourge

Malvertising has grown in popularity among cybercriminals in the past few years, with Google often addressing the issue reactively rather than proactively.

Security researcher Will Dormann posted a lengthy thread to X earlier this year criticizing Google's apparent lack of action in preventing malicious ads from appearing in Search results.

It followed a widely publicized case of a cryptocurrency influencer downloading what they thought was a copy of the OBS streaming software. The link turned out to be malware and they then had their NFT (remember those?) wallet raided.

Among the many criticisms was the suggestion that Google didn't run links through the VirusTotal platform, which it owns, before approving them for display.

Ransomware crooks SIM swap medical research biz exec, threaten to leak stolen data

READ MORE

In a number of examples listed by Dormann, searches displayed links that led to known malicious payloads detected by various security vendors.

Numerous malware campaigns used malvertising for attacks throughout the year. HP Wolf Security's report from January found a notable increase in malvertising activity, especially toward the end of 2022.

It found a variety of campaigns making use of search engine ads to promote their payloads, including IcedID, BatLoader, and Rhadamanthys Stealer. Weeks later, SentinelOne alerted the community to .NET malware loaders using the same method.

Recently, in its Digital Defense Report, Microsoft identified Magniber deployments from the Russian cybercrime group that it tracks as Storm-0381 through its heavy use of malvertising. ®

Updated on November 17 to add:

A Google spokesperson told The Register: "We don’t allow ads on our platform that contain malicious software. We’ve reviewed the report in question and taken action where appropriate. We continue to see bad actors operate with more sophistication and at a greater scale, using a variety of tactics to evade our detection.

"We invest heavily in our ads safety efforts and have a team of thousands working around the clock to enforce our policies at scale."

Send us news
1 Comment

Cisco's cloud network push will tie licensing change to generational product refreshes

Bundled support has already come to Catalyst – but don't bother asking how it works

Scores of US credit unions offline after ransomware infects backend cloud outfit

Supply chain attacks: The gift that keeps on giving

Black Basta ransomware operation nets over $100M from victims in less than two years

Assumed Conti offshoot averages 7 figures for each successful attack but may have issues with, er, 'closing deals'

Leader of pro-Russia DDoS crew Killnet 'unmasked' by Russian state media

Also: NXP China attack, Australia can't deliver on ransom payment ban (yet), and Justin Sun's very bad month

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

AlphV lays claims to the intrusion

Europol shutters ransomware operation with kingpin arrests

A few low-level stragglers remain on the loose, but biggest fish have been hooked

US readies prison cell for another Russian Trickbot developer

Hunt continues for the other elusive high-ranking members

BlackCat ransomware crims threaten to directly extort victim's customers

Accounting software firm Tipalti says it’s investigating alleged break-in of its systems

Cisco intros AI to find firewall flaws, warns this sort of thing can't be free

Predicts cyber crims will find binary brainboxes harder to battle

British Library begins contacting customers as Rhysida leaks data dump

CRM databases were accessed and library users are advised to change passwords

Cisco delivers a powerup to its switches for small and medium biz

Catalyst 1200 and 1300 keep perpetual licenses, PoE and stackability

Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware

Latest offensive cyber group to switch to atypical programming for payloads