Google Ad Platform Exploited by Fake Google Authenticator Ads

by | Aug 1, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Google has fallen victim to a malicious advertising (malvertising) campaign on its own ad platform, allowing threat actors to create fake Google Authenticator ads that deliver the DeerStealer information-stealing malware.

Threat Actors Exploit Google Ads

For years, malvertising campaigns have targeted Google Search, where threat actors place ads impersonating well-known software sites to install malware on visitors’ devices. These ads often display legitimate domains, adding a false sense of trust. In a recent campaign discovered by Malwarebytes, threat actors created ads for Google Authenticator that appeared when users searched for the software on Google.

Effective Cloaking Techniques

What makes these ads particularly convincing is that they display ‘google.com’ and “https://www.google.com” as the click URL, which should not be allowed for third-party advertisements. This URL cloaking strategy has been used in previous malvertising campaigns targeting KeePass, Arc browser, YouTube, and Amazon, yet Google continues to fail in detecting and preventing these imposter ads.

Verified advertiser accountVerified advertiser account
Source: Malwarebytes

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Verification Loopholes

Malwarebytes noted that the advertiser’s identity is verified by Google, highlighting a significant weakness in the ad platform that threat actors exploit. When contacted about this campaign, Google reported blocking the fake advertiser identified by Malwarebytes.

Challenges in Detection

Google explained that threat actors evade detection by creating thousands of accounts simultaneously and using text manipulation and cloaking to show different websites to reviewers and automated systems. In response, Google is scaling up its automated systems and human reviewers to better detect and remove such malicious campaigns. In 2023, these efforts resulted in the removal of 3.4 billion ads, the restriction of over 5.7 billion ads, and the suspension of over 5.6 million advertiser accounts.

Fake Google Authenticator Sites

Clicking on the fake Google Authenticator ads redirects visitors through several pages to the landing page at “chromeweb-authenticators.com,” which mimics a genuine Google portal. Malware analysis firm ANY.RUN also observed this campaign, sharing additional landing pages like authenticcator-descktop[.]com, chromstore-authentificator[.]com, and authentificator-gogle[.]com.




Malware Delivery via GitHub

Clicking on the ‘Download Authenticator’ button on these fake sites triggers a download of a signed executable named “Authenticator.exe” hosted on GitHub. The repository hosting the malware is named ‘authgg’ by user ‘authe-gogle,’ matching the campaign’s theme.

The malicious site spreading DeerStealerThe malicious site spreading DeerStealer
Source: Malwarebytes

The malware sample downloaded by Malwarebytes was signed by ‘Songyuan Meiying Electronic Products Co., Ltd.,’ enhancing its credibility and allowing it to bypass security measures on Windows.

Valid signatures on different samples of the malwareValid signatures on different samples of the malware
Source: Malwarebytes, ANY.RU

Malware Impact

Once executed, the download launches the DeerStealer information-stealing malware, which captures credentials, cookies, and other information stored in the user’s web browser.

Recommendations for Users

Users are advised to avoid clicking on promoted results on Google Search, use an ad blocker, or bookmark the URLs of software projects they frequently use. Before downloading any files, ensure the URL corresponds to the official domain of the project, and always scan downloaded files with up-to-date antivirus tools before executing them.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This