Description

Securonix, a cybersecurity firm, is monitoring a malicious campaign named SEO#LURKER, wherein threat actors manipulate search results and Google ads to deceive users seeking authentic software like WinSCP into downloading malware. The scheme directs users to a compromised WordPress site, gameeweb[.]com, redirecting them to an attacker-controlled phishing platform. Utilizing Google's Dynamic Search Ads (DSAs), the attackers leverage these automatically generated ads to entice victims towards the infected site, winccp[.]net, masquerading as the legitimate WinSCP site. The attackers rely on a correct referrer header from gaweeweb[.]com to redirect users to winccp[.]net; otherwise, users are redirected to the Rick Astley YouTube video. Upon reaching the fake WinSCP site, users are prompted to download a ZIP file containing an executable that utilizes DLL side-loading to execute a DLL file named python311.dll. This DLL downloads and executes a genuine WinSCP installer while surreptitiously deploying Python scripts for malicious activities and establishing persistence. The Python scripts connect with a remote server controlled by the attackers, enabling them to execute enumeration commands on the victim's system. This intricate attack, utilizing Google Ads, targets individuals seeking WinSCP software, particularly impacting users in the U.S. through geoblocking measures on the malware-hosting site. This incident echoes a similar abuse of Google's Dynamic Search Ads discovered by Malwarebytes targeting PyCharm users, redirecting them to a compromised site hosting an installer leading to information-stealing malware deployment.