Researchers at Malwarebytes have discovered a new and large malvertising campaign which targets users of the popular YouTube to MP3 conversion website Onlinevideoconverter. According to SimilarWeb the conversion website is visited by over 200 million users a month, making it clear why it has been targeted by hackers distributing malware via a malvertising campaign. Such campaigns had fallen out of favor in recent months according to researchers at Malwarebytes with detections of such campaigns steadily decreasing. The latest campaign is a clear indication that the tactic is still a viable one for hackers to use.
Malvertising involves the malicious use of advertising to spread malware. One of the main methods in distributing malware this way is by hiding and then subsequently executing malicious code within relatively safe online advertisements. These ads can lead a victim to unreliable content or directly infect a victim's computer with malware, which may damage a system, access sensitive information or even control the computer through remote access. Malvertising is often used in conjunction with what has been termed by researchers as drive-by downloads and can be defined as the unintentional downloading of malware without the need for the user to click on a download link. The malware can be downloaded merely by clicking on an ad which is deemed safe by the user.
In a blog post published by Malwarebytes’ Director of Threat Intelligence, Jerome Segura, details of the latest campaign are revealed to the public. In this instance, the malvertising campaign distributes the “elusive” GreenFlash Sundown exploit kit. The exploit kit has been deemed elusive as it is rarely seen been used outside Asia with the majority of uses occurring in South Korea. The malware is spread through servers used to deliver ads by multiple publishers, including YouTube to audio conversion service mentioned above.
Once a user clicks on an ad they believe is for the conversion service the infection begins. Rather than been redirected to the service's website, visitors are sent to the exploit kit. Here the exploit kit will perform a number of checks to see if the visitor is a viable target. These checks are designed to see if the machine clicking the link is a virtual machine or not. If it is a virtual machine, a file designed to emulate an actual computer and thus will be of very little use to the hacker, the process ends.
“Our previous encounters with GreenFlash Sundown EK, for example during our winter 2019 exploit kits review, were always limited to South Korea. However, based on our telemetry this campaign is active in North America and Europe, which is an interesting departure for this threat group.”
The use of the Seon ransomware is what will interest many within the InfoSec community. The malware was first discovered in November 2018 by the Anti-malware Vigilante. Like other ransomware variants, it encrypts files, this time by adding the .FIXT extension then demands a ransom to be paid by in Bitcoin. Seon ransomware installs itself in the victim’s computer and searches for its target files which include audio files, video files, word documents, etc. It then encrypts the data files using strong cryptography algorithms. The ransomware generates two ransom notes one is placed on the desktop of the infected computer and the other is placed on the folder with the infected files. What separates Seon from other variants and makes it a worthy adversary, is that it will delete Shadow Volume copies on disk to prevent the recovery of data. By removing the shadow copies the ransomware removes the restore points previously set up by the machine, further making data recovery harder. The combining of ransomware within exploit kits is nothing new but it is still a deadly combination. When combined with Seon the danger level posed by the exploit kit is increased tenfold.
As mentioned above that malvertising took a dip in popularity amongst those operating in the cybercrime shadows. This latest campaign shows that malvertising campaigns are still a threat and need to still be taken seriously. In 2017 researchers at GeoEdge malvertising campaigns cost ad companies 1.13 billion USD. It was estimated at the time that the number for the following could increase from anywhere between 20% and 30%. In the same article it was also shown why images, including GIFS, are a popular attack vector. Researchers noted,
“Not every security provider monitors and analyzes images for malicious code on a constant basis. This creates an opportunity for the exploitation of a potential vulnerability in the embedded images which, if left undetected, could provide malicious advertisers with a potential windfall.”
The tactic of hiding malware in images has been called stenography and Adi Zlotkin, Security Research Team Leader at GeoEdge said that,
“We first noticed incidences of steganography – malicious code embedded in images – in early 2018 but since then, in the last few months, the number of such attacks has increased exponentially,”
Since then many firms have wisened up to this tactic and included security modules to prevent such abuse of images for the purposes of infecting users with malware. However, infections still occur and in instances such as the one discussed above an innocent click could result in the victim paying a ransom, mining cryptocurrency without their knowledge, or surrendering vital information.