{"id":16221,"date":"2023-07-24T12:18:32","date_gmt":"2023-07-24T12:18:32","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=16221"},"modified":"2023-07-24T12:42:38","modified_gmt":"2023-07-24T12:42:38","slug":"gozi-iceid-malvertising","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/gozi-iceid-malvertising\/","title":{"rendered":"Gozi and IcedID Trojans Spread via Malvertising"},"content":{"rendered":"<p>Malvertising on Google Search is an unpleasant occurrence where <strong>malicious ads appear in search engine results<\/strong>. These ads are meant to help users find relevant information. But unfortunately, some <strong>cybercriminals use paid advertisements<\/strong> to entice users to visit harmful websites and deceive them into downloading malicious software.<\/p>\n<h2>How does malvertising work?<\/h2>\n<p>Malvertising is an attack where <a href=\"https:\/\/gridinsoft.com\/blogs\/google-search-malvertising-fake-ads\/\">malicious code is inserted<\/a> into legitimate online advertising networks. This code usually leads users to <strong>harmful websites<\/strong>. <\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_Blog_Malvertising-infection-chain_790x410px-1.webp\" alt=\"How does malvertising work?\" width=\"790\" height=\"410\" class=\"aligncenter size-full wp-image-16225\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_Blog_Malvertising-infection-chain_790x410px-1.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_Blog_Malvertising-infection-chain_790x410px-1-300x156.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_Blog_Malvertising-infection-chain_790x410px-1-768x399.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><\/p>\n<p>Some <a href=\"https:\/\/gridinsoft.com\/blogs\/malicious-campaign-through-google-search\/\">malicious actors create fake websites<\/a> that mimic legitimate software sites, using tactics like typosquatting (using misspelled versions of well-known brand and company names as their URL) or combosquatting (combining popular names with random words for their URL). This makes the <strong>fake sites appear legitimate<\/strong> to unsuspecting users, as their domain names reference the original software or vendor. The fake web pages are <strong>designed to look identical to the real ones<\/strong>, and the threat actors pay to promote the site through search engines to boost its visibility.<br \/>\nFake WinRar ad on Google<\/p>\n<figure id=\"attachment_16227\" aria-describedby=\"caption-attachment-16227\" style=\"width: 631px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Google-search-result.webp\" alt=\"Fake WinRar ad on Google search result\n\" width=\"631\" height=\"331\" class=\"size-full wp-image-16227\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Google-search-result.webp 631w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Google-search-result-300x157.webp 300w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><figcaption id=\"caption-attachment-16227\" class=\"wp-caption-text\">Fake WinRar ad on Google search result<br \/><\/figcaption><\/figure>\n<p>Google has a vast user base, processing over 8 billion daily queries. This makes their search results <strong>one of the largest advertising networks<\/strong> available. Unfortunately, a single malicious ad can potentially be viewed by millions of people, causing thousands to click on it. The<strong> situation worsens exponentially<\/strong> when at least ten topics contain negative Google ads.<\/p>\n<h2>BatLoader as malware loader<\/h2>\n<p>BatLoader is a type of malware that <strong>enables cybercriminals to download more advanced<\/strong> and harmful malware onto a targeted system. The batch script can download two specific types of malware: IcedID, and Gozi\/Ursnif, a backdoor. <\/p>\n<p>It&#8217;s worth noting that the BatLoader campaign is <strong>still using malvertising<\/strong>, unlike IcedID. What&#8217;s particularly interesting is that there has been a shift in the type of users being targeted. While malicious ads previously <strong>targeted those searching for IT tools<\/strong> in late 2022 and early 2023, more recent campaigns now use AI-related lures to target users searching for devices <a href=\"https:\/\/gridinsoft.com\/blogs\/chat-gpt-social-engineering\/\">such as Midjourney and ChatGPT<\/a>.<\/p>\n<h2>IcedID Malware<\/h2>\n<p>IcedID (a.k.a BokBot) is a type of malware that was first discovered in 2017 and classified as both a banking Trojan and a remote access Trojan (RAT). Experts say IcedID is as <strong>powerful as other advanced banking Trojans<\/strong> like Zeus, Gozi, and Dridex. To infect a system, IcedID relies on other malware like Emotet to get initial access. Once it&#8217;s in, IcedID <strong>can steal financial information<\/strong> and even <a href=\"https:\/\/howtofix.guide\/ransomware\/\" target=\"_blank\" rel=\"noopener nofollow\">drop malware like ransomware<\/a>. It&#8217;s also capable of moving through a network with ease.<\/p>\n<figure id=\"attachment_16229\" aria-describedby=\"caption-attachment-16229\" style=\"width: 740px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Encrypted-zip-archives.webp\" alt=\"IcedID Malware\" width=\"740\" height=\"287\" class=\"size-full wp-image-16229\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Encrypted-zip-archives.webp 740w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/Encrypted-zip-archives-300x116.webp 300w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><figcaption id=\"caption-attachment-16229\" class=\"wp-caption-text\">Encrypted zip archives<\/figcaption><\/figure>\n<p>The group called Shatak <a href=\"https:\/\/gridinsoft.com\/phishing\">often sends phishing emails<\/a> to spread malware called IcedID. They <strong>attach Microsoft Office documents with macros<\/strong>, <code>.iso<\/code> files, or encrypted <code>.zip<\/code> archives. Once the malware infects a system, it searches for the best way to spread and gain control. It does this by looking for a way to <strong>install itself without being detected<\/strong> and then waits for the system to reboot before activating its main module. By doing this, IcedID can blend in with legitimate processes, <strong>making it harder to detect<\/strong>.<\/p>\n<h2>Gozi backdoor\/banking trojan<\/h2>\n<p>URSNIF, the malware known as Gozi that <strong>attempts to steal online banking credentials<\/strong> from victims&#8217; Windows PCs, is <strong>evolving to support extortionware<\/strong>. This banking trojan has been around since the mid-2000s and is one of the oldest. It has multiple variants and has been known by names such as URSNIF, Gozi, and ISFB. These are the most effective methods for protecting yourself from attack: encountering other malware families, and its source code <strong>has been leaked twice<\/strong> since 2016. According to malware analysts, it is now considered a &#8220;set of related siblings&#8221; rather than a single malware family.<\/p>\n<h2>Malware Mitigation and Prevention<\/h2>\n<p>Detecting and mitigating <strong>malvertising attacks can be challenging<\/strong>, and both end users and publishers must take action to combat this threat. Implementing a comprehensive cybersecurity program at the enterprise level is the best way to protect against malvertising. <strong>Organizations can reduce their risk<\/strong> of falling victim to these attacks by taking appropriate precautions.<\/p>\n<p>These are the most effective methods for protecting yourself from attack:<\/p>\n<ul>\n<li>Antivirus software<strong> can protect certain types of threats<\/strong>, such as drive-by downloads or malicious code that malvertising may execute.<\/li>\n<li><strong>Ad blockers can provide adequate protection<\/strong> against malvertising since they block all ads and their potentially harmful components.<\/li>\n<li><a href=\"https:\/\/howtofix.guide\/update-chrome\/\" target=\"_blank\" rel=\"noopener nofollow\">By updating your browser and plugins<\/a>, you can prevent numerous malvertising attacks, especially the ones that occur before the user clicks on an advertisement.<\/li>\n<li>It is <strong>recommended to prioritize critical systems<\/strong> and <a href=\"https:\/\/gridinsoft.com\/zero-trust\">implement Zero Trust solutions<\/a> whenever feasible.<\/li>\n<li><a href=\"https:\/\/gridinsoft.com\/mfa\">Implementing multi-factor authentication<\/a> for all essential services, particularly online banking and cryptocurrency accounts, is advisable.<\/li>\n<li>It is recommended to <strong>conduct user awareness training<\/strong> to educate employees about phishing techniques. Additionally, it is advisable to establish standard operating procedures (SOPs) for dealing with suspicious emails and documents.<\/li>\n<\/ul>\n<p>Knowing <a href=\"https:\/\/gridinsoft.com\/social-engineering\">standard social engineering tactics<\/a> like phishing and malspam techniques to <strong>detect malware attacks is essential<\/strong>. While network traffic analysis can help see known versions of malware after infection, <strong>developers frequently update their malware<\/strong> with new methods to evade detection. This makes reliably detecting malware infections difficult without advanced endpoint protection products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malvertising on Google Search is an unpleasant occurrence where malicious ads appear in search engine results. These ads are meant to help users find relevant information. But unfortunately, some cybercriminals use paid advertisements to entice users to visit harmful websites and deceive them into downloading malicious software. How does malvertising work? Malvertising is an attack [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":16224,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[625,619,1364,1154,24],"class_list":{"0":"post-16221","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-backdoor","9":"tag-cybersecurity","10":"tag-icedid","11":"tag-malvertising","12":"tag-trojan"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/07\/GS_Blog_banner_Citrix-and-Adobe-Vulnerabilities-Under-Active-Exploitation_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=16221"}],"version-history":[{"count":15,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16221\/revisions"}],"predecessor-version":[{"id":16245,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/16221\/revisions\/16245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/16224"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=16221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=16221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=16221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}