New Malware ‘LOBSHOT’ Secretly Takes Over Windows Devices via Google Ads

New Malware ‘LOBSHOT’ Secretly Takes Over Windows Devices via Google Ads

Premium Content

Subscribe to Patreon to watch this episode.
Reading Time: 3 Minutes

Google Ads Used to Distribute LOBSHOT RAT

Security researchers have discovered a new remote access Trojan (RAT) named LOBSHOT being distributed via Google Ads. The ads, which promoted the legitimate AnyDesk remote management software, led users to a fake AnyDesk site at amydeecke[.]website. This site pushed a malicious MSI file that executed a PowerShell command to download a DLL from download-cdn[.]com, a domain previously associated with the TA505/Clop ransomware gang. However, it is unclear if TA505 is still using the domain as it had changed ownership in the past.

Fake AnyDesk ad spotted by Will Dormann
Source: MalwareHunterTeam & Dormann

Once executed, the LOBSHOT malware checks if Microsoft Defender is running, and if detected, terminates execution to prevent detection. If Defender is not detected, the malware configures Registry entries to start automatically when logging in to Windows and then transmits system information from the infected device, including running processes.

LOBSHOT malware is saved in the C:ProgramData folder and then executed by RunDLL32.exe. The malware will also check for 32 Chrome cryptocurrency wallet extensions, nine Edge wallet extensions, and 11 Firefox wallet extensions. After enumerating the extensions, the malware will execute a file in C:ProgramData. However, as that file did not exist in their analysis, researchers are unsure whether it is used to steal the extension data or for some other purpose.

See Also: So you want to be a hacker?
Offensive Security, Bug Bounty Courses

LOBSHOT Malware Includes hVNC Module for Remote Access Control

Elastic Security Labs, the researchers who discovered the malware, found that LOBSHOT included an hVNC module, allowing the threat actors to access an infected device remotely. hVNC, or hidden virtual network computing, is a VNC remote access software modified to control a hidden desktop on the infected device, rather than the main desktop used by the device’s owner. This allows a threat actor to remotely control a Windows desktop computer without the victim knowing it is happening.

LOBSHOT deploys an hVNC module that allows the threat actors to control the hidden desktop using their mouse and keyboard as if they were in front of it. With this kind of access, the threat actors have complete control over the device, allowing them to execute commands, steal data, and even deploy further malware payloads. As AnyDesk is commonly used in business environments, the malware is likely used for initial access to corporate networks and to spread laterally to other devices.

Rising trend of malware distribution through Google Ads

This type of access could lead to ransomware attacks, data extortion, and other attacks. The discovery of LOBSHOT highlights the growing trend of threat actors utilizing Google Ads to distribute malware in search results. In fact, earlier this year, BleepingComputer and numerous cybersecurity researchers reported a dramatic increase in threat actors using Google Ads to distribute malware. These advertising campaigns impersonated popular websites for various applications but instead pushed malware, including Gozi, RedLine, Vidar, Cobalt Strike, SectoRAT, and the Royal Ransomware.

 
 

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: info@blackhatethicalhacking.com

Source: bleepingcomputer.com

Source Link

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!

Information Security Solutions

Find out how Pentesting Services can help you.

The post New Malware ‘LOBSHOT’ Secretly Takes Over Windows Devices via Google Ads first appeared on Black Hat Ethical Hacking.

About The Author