New malware uses search engine ads to target pirate gamers

MosaicLoader uses advanced obfuscation techniques to avoid detection

Skull and crossbones on a computerized background

A new piece of malware uses paid advertisements in search results to target users searching for pirated software. It uses sophisticated techniques to hide its presence while dropping a Pandora's box of malicious programs onto victims' systems. 

Security company Bitdefender detailed the MosaicLoader software’s inner workings, which mimics legitimate games-related software to avoid detection. 

Bitdefender's report found the initial malware dropper stored in archives that pretend to offer cracked software installers. The company said cyber criminals appear to be purchasing pay-per-click (PPC) advertisements related to pirated software then inserting these links to the malware droppers into their ads. 

The initial program acts as an installer for “malware sprayer” software that it downloads from a command-and-control (C2) server. This malware comes from a list of sources maintained by the criminals behind the software, which include URLs dedicated to hosting malware files and public Discord channels. 

The malware the program installs includes simple cookie stealers that can be used to hijack victims' online sessions. They can exfiltrate Facebook login data, enabling cyber criminals to take over a victim's account, making posts that damage a victim's reputation or spread malware further. 

Other malware the dropper installs include cryptocurrency miners and the Glupteba back door, which is a botnet program that launches multiple attacks on browsers and home routers and takes its instruction via the Bitcoin blockchain. 

Related Resource

Aberdeen Report: How a platform approach to security monitoring initiatives adds value

Integration, orchestration, analytics, automation, and the need for speed

White text against a pink-red background - whitepaper from IBMDownload now

After downloading its initial files, the malware dropper uses PowerShell to exclude them from Windows Defender's anti-malware scanner. Then, it registers an executable in the Windows registry and installs a service to reinsert that entry if the user removes it. 

BitDefender's analysis shows the malware using plenty of tricks to avoid detection. It creates folders that look like gaming directories to store its files and uses processes that look like they're running software from GPU vendor NVIDIA. 

The malware also obfuscates its activities by breaking its code into small chunks and jumping between them. It also uses mathematical operations with large numbers to generate data the program needs, making its code look more like chunks of data. It also includes filler data that does nothing but introduce more noise into the code, making it harder for security researchers to debug. 

In stark contrast to their code obfuscation, the malware authors hard-coded their C2 server’s URL. This enabled the researchers to find the server's IP address and link it to several other malware campaigns. 

Featured Resources

B2B under quarantine

Key B2C e-commerce features B2B need to adopt to survive

Download now

The top three IT pains of the new reality and how to solve them

Driving more resiliency with unified operations and service management

Download now

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently

Download now

How fashion retailers are redesigning their digital future

Fashion retail guide

Download now

Recommended

How to use machine learning and AI in cyber security
Security

How to use machine learning and AI in cyber security

30 Jul 2021
Chipotle’s marketing email hacked to send phishing emails
phishing

Chipotle’s marketing email hacked to send phishing emails

29 Jul 2021
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

29 Jul 2021
Colonial Pipeline hack spurred copycat attacks on other oil and gas companies
hacking

Colonial Pipeline hack spurred copycat attacks on other oil and gas companies

29 Jul 2021

Most Popular

The benefits of workload optimisation
Sponsored

The benefits of workload optimisation

16 Jul 2021
RMIT to be first Australian university to implement AWS supercomputing facility
high-performance computing (HPC)

RMIT to be first Australian university to implement AWS supercomputing facility

28 Jul 2021
Samsung Galaxy S21 5G review: A rose-tinted experience
Mobile Phones

Samsung Galaxy S21 5G review: A rose-tinted experience

14 Jul 2021