Description

Zscaler ThreatLabz researchers have uncovered a surge in fraudulent websites hosted on popular web hosting and blogging platforms, part of an elaborate strategy to spread malware through SEO poisoning. These websites, which span various topics like pirated software, gaming, travel, and food recipes, manipulate search engine results to boost their visibility. By leveraging the widespread use of web hosting platforms, threat actors ensure that their malicious sites appear at the top of search results, increasing the likelihood of users inadvertently visiting them and getting infected with malware. In this blog post, we explore the techniques employed by threat actors to distribute malicious information stealers while evading detection through obfuscation and anti-debugging methods. Malicious payloads are delivered through multi-level zipped files hidden within seemingly innocuous content. Once executed, these payloads perform various malicious activities, including process hollowing, DLL sideloading, and executing PowerShell commands to download additional malware and communicate with command-and-control servers. To evade detection, threat actors employ sophisticated evasion techniques. For instance, they redirect users based on whether they access the site directly or through a search engine. They also employ obfuscation methods and checks on referral URLs. Moreover, malicious sites are designed to evade analysis by security researchers, avoiding redirection when accessed directly. These sites often appear legitimate and reputable, increasing the chances of users downloading malware unknowingly. Despite their seeming authenticity, these malicious websites pose a significant threat. Users searching for software or other content might end up downloading malware instead. The attackers' multi-level obfuscation techniques make it challenging for security software to detect and mitigate these threats effectively. It is crucial for users to exercise caution when downloading software and to prioritize visiting reputable websites from trusted sources to prevent falling victim to such malware campaigns.