Why it matters: Cyber criminals are constantly analyzing the technology space for new ways to exploit users and obtain their personal data. In the past, phishing attacks have been leveraged to trick users into providing sensitive information by posing as a credible source and requesting the user's data. But according to Cisco's Talos threat intelligence organization, a new malicious campaign has been gaining traction as an effective method to harvest information from unknowing users.
Known as malvertising, Cisco's Talos Intelligence believes a specific campaign known as "Magnat" uses fraudulent online advertising to trick users that are searching for legitimate software installers. The Cisco threat intelligence team believes the Magnat campaign may have started in late 2018 and targets users in Canada, the United States, Australia, and several other European nations.
Once a user is directed to the fraudulent download, they run a fake installer that deploys three distinct pieces of malware to their system. While the fake installer gets to work installing multiple malware components, it does not install the actual application the user was originally searching for.
The first piece of malware is a password stealer used to collect user credentials, often via a common tool known as Redline. Another piece of malware, known as MagnatBackdoor, sets up remote access to the user's device via Microsoft Remote Desktop. This access, combined with the user credentials stolen by Redline (or a similar tool), can provide unfettered access to the user's systems despite being secured and firewalled. The final piece of the malware trifecta is a Chrome browser extension known as MagnatExtension, which is used for keylogging, obtaining screenshots of sensitive information, etc.
An August 2021 tweet provided screenshots and download samples of a suspected malvertising campaign. Talos analyzed the samples referenced in the tweet and verified at least one sample contained the MagnatBackdoor, MagnatExtension, and Redline malware components.
#RedLineStealer being delivered through fake WeChat installers, coming from @GoogleAds .— Aura (@SecurityAura) August 9, 2021
.zip -> .iso -> .exehttps://t.co/J5npamHM1P
Creates a new user account, forwards RDP port, drops RDPWrap... Damn.
cc @JAMESWT_MHT @James_inthe_box @malwrhunterteam pic.twitter.com/0Jvaz4tChc
Talos believes the Magnat tools have been developed and improved over the course of several years and show no signs of slowing down anytime soon. The installer package's name is constantly evolving and typically references the name of popular applications to lend credibility and trick users into deploying the package. Examples of past package names include viber-25164.exe, wechat-35355.exe, build_9.716-6032.exe, setup_164335.exe, nox_setup_55606.exe and battlefieldsetup_76522.exe.