BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads

0
899
BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads


Mar 11, 2023Ravie LakshmananCyber Threat Intelligence

BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads

The malware downloader generally known as BATLOADER has been noticed abusing Google Ads to ship secondary payloads like Vidar Stealer and Ursnif.

According to cybersecurity firm eSentire, malicious adverts are used to spoof a variety of reputable apps and providers reminiscent of Adobe, OpenAPI’s ChatGPT, Spotify, Tableau, and Zoom.

BATLOADER, because the identify suggests, is a loader that is liable for distributing next-stage malware reminiscent of info stealers, banking malware, Cobalt Strike, and even ransomware.

One of the important thing traits of the BATLOADER operations is the usage of software program impersonation ways for malware supply.

This is achieved by establishing lookalike web sites that host Windows installer information masquerading as reputable apps to set off the an infection sequence when a consumer looking for the software program clicks a rogue advert on the Google search outcomes web page.

Vidar Stealer and Ursnif Payloads

These MSI installer information, when launched, execute Python scripts that include the BATLOADER payload to retrieve the next-stage malware from a distant server.

This modus operandi marks a slight shift from the earlier assault chains noticed in December 2022, when the MSI installer packages had been used to run PowerShell scripts to obtain the stealer malware.

WEBINAR

Discover the Hidden Dangers of Third-Party SaaS Apps

Are you conscious of the dangers related to third-party app entry to your organization’s SaaS apps? Join our webinar to study in regards to the forms of permissions being granted and methods to decrease danger.

RESERVE YOUR SEAT

Other BATLOADER samples analyzed by eSentire have additionally revealed added capabilities that permit the malware to determine entrenched entry to enterprise networks.

“BATLOADER continues to see modifications and enchancment because it first emerged in 2022,” eSentire stated.

“BATLOADER targets numerous in style purposes for impersonation. This isn’t any accident, as these purposes are generally present in enterprise networks and thus, they’d yield extra invaluable footholds for monetization by way of fraud or hands-on-keyboard intrusions.”

Found this text attention-grabbing? Follow us on Twitter and LinkedIn to learn extra unique content material we publish.

LEAVE A REPLY

Please enter your comment!
Please enter your name here