Online Criminals Exploit Trending Software Searches to Spread FakeBat Malware

Aug 19, 2024Ravie LakshmananMalicious Advertising / Online Crime

Experts in cybersecurity have identified a rise in malicious software infiltrations attributed to deceptive advertising campaigns disseminating a loader known as FakeBat.

Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware

Aug 19, 2024Ravie LakshmananMalicious Advertising / Online Crime

Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware

Experts in cybersecurity have identified a rise in malicious software infiltrations attributed to deceptive advertising campaigns disseminating a loader known as FakeBat.

“These assaults capitalize on current trends by targeting users looking for widely-used business applications,” as outlined in a technical analysis by the Mandiant Managed Defense team. “The infection involves a corrupted MSIX installer that triggers a PowerShell script to download a secondary payload.”

FakeBat, also identified as EugenLoader and PaykLoader, is affiliated with a threat actor named Eugenfest. The Google-owned intelligence unit is monitoring the malware under the moniker NUMOZYLOD and has assigned the Malware-as-a-Service (MaaS) endeavor to UNC4536.

Online Security

Chains of attacks spreading the malware utilize drive-by download methodologies to redirect individuals seeking popular software to counterfeit websites hosting rigged MSI installers. Some of the malware varieties delivered through FakeBat include IcedID, RedLine Stealer, Lumma Stealer, SectopRAT (also known as ArechClient2), and Carbanak, a malicious program connected with the FIN7 cybercrime syndicate.

“UNC4536’s tactics involve utilizing deceptive advertising to disseminate manipulated MSIX installers masked as popular software such as Brave, KeePass, Notion, Steam, and Zoom,” Mandiant highlighted. “These altered MSIX installers are hosted on platforms mimicking legitimate software repositories, enticing users to download them.”

FakeBat Malware

What sets this operation apart is the employment of MSIX installers camouflaged as Brave, KeePass, Notion, Steam, and Zoom, which have the capability to run a script before initiating the main application through a setup known as startScript.

Essentially, UNC4536 serves as a conduit for malware distribution, with FakeBat acting as a conduit for subsequent payloads for their commercial associates, including FIN7.

“NUMOZYLOD collects system data, including specifics about the operating system, domain association, and present antivirus solutions,” according to Mandiant. “In some versions, it retrieves the public IPv4 and IPv6 address of the host and transmits this data to its Command and Control server, [and] creates a shortcut (.lnk) in the StartUp directory for persistence.”

Online Security

This revelation comes a bit over a month after Mandiant also outlined the attack lifecycle linked to another malware downloader known as EMPTYSPACE (or BrokerLoader or Vetta Loader), utilized by a financially driven threat faction dubbed UNC4990 to enable data theft and crypto mining activities targeting Italian organizations.

Found this content intriguing? Follow us on Twitter and LinkedIn for more exclusive updates.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.