Brad · @malware_traffic
2260 followers · 114 posts · Server infosec.exchange

Also posted at: twitter.com/malware_traffic/st

2023-02-03 (Friday) - DEV-0569 activity: Google ad fake CPUID page --> "FakeBat" Loader --> Redline Stealer & Gozi/ISFB/Ursnif

IOCs, pcap of the infection, and associated malware/artifacts available at: malware-traffic-analysis.net/2

Tags:

Hopefully, recent blogs about all these malicious Google ads will force Google to change something. But I have a feeling Google will keep on being Google.

#dev0569 #fakebat #gozi #isfb #malware #pcap #redline #RedLineStealer #ursnif

Last updated 2 years ago

MalwareLab :verified: · @malwarelab_eu
203 followers · 19 posts · Server infosec.exchange

Delivery of via by in malvertising campaign. This threat actor has used BATLOADER -> Beacon -> Royal .

Ref: microsoft.com/en-us/security/b

Footnote: adblocking solutions (e.g. , , @Raspberry_Pi) can prevent similar attacks

#batloader #malware #googleads #dev0569 #cobaltstrike #ransomware #ublockorigin #adblock #pihole

Last updated 2 years ago

DarkOperator 🚀 · @DarkOperator
639 followers · 358 posts · Server infosec.exchange