In recent months, cybersecurity experts have identified a concerning trend where malicious actors exploit Facebook and Google advertising platforms to impersonate legitimate financial services. By promoting free or premium access to well-known trading platforms, these threat actors successfully lure unsuspecting users into downloading trojanized applications.
Sophisticated Social Engineering Tactics
The campaign employs advanced social engineering techniques, leveraging familiar branding and verified badges to create an illusion of authenticity that can easily deceive users. Victims are directed through paid advertisements to obfuscated payloads designed to evade both automated analysis and human scrutiny.
Initial Infection Vector
The infection process typically begins when users click on Facebook ads promising one-year free access to premium charting tools. These ads redirect users to landing pages hosting customized service worker scripts. These scripts are often encrypted with AES-CBC and utilize StreamSaver.js to deliver a malicious installer disguised as a legitimate executable.
Advanced Evasion Techniques
Once downloaded, the oversized loader—sometimes exceeding 700 MB—employs anti-sandbox checks to prevent execution in virtualized environments. Only after passing these defenses does the downloader initiate its multi-stage process. Bitdefender analysts have observed that, following these initial defenses, the malware shifts to a WebSocket communication channel on port 30000, replacing the older HTTP-based approach used in previous campaigns.
Dynamic Payload Deployment
The threat actors encrypt their front-end JavaScript and deploy a deobfuscation routine at runtime to construct the final payload. This dynamic approach circumvents most static analysis tools and significantly complicates forensic investigations.
Persistence Mechanisms
Upon successful execution, the malware creates a persistent Scheduled Task named EdgeResourcesInstallerV12-issg. This task downloads and executes subsequent PowerShell scripts via `Invoke-Expression`, ensuring reinfection upon system restart and modifying Windows Defender settings to exclude its payload directories.
Infection Mechanism Details
The infection mechanism centers on a sophisticated downloader component that leverages both service worker APIs and modern web tracking frameworks to blend malicious operations with legitimate analytics. By integrating PostHog for event tracking alongside third-party pixels such as Facebook Pixel, Google Ads Conversion Tracking, and Microsoft Ads Pixel, the front-end application gains visibility into user behavior. This telemetry allows operators to selectively deploy malicious content only to high-value targets, serving benign pages to all others.
Seamless Delivery Mechanism
Once the user initiates a download, the service worker intercepts the request, decrypts and deobfuscates the payload, then streams the binary through StreamSaver.js to the file system—bypassing traditional browser download safeguards. This seamless delivery mechanism, paired with domain rotation and language-specific ads, enables rapid, widespread propagation while maintaining a low profile.
Global Impact and Recommendations
The campaign’s global scope encompasses regions such as the United States, Europe, Australia, China, Vietnam, India, and the Philippines, indicating a well-resourced operation with international ambitions. To mitigate the risks associated with such sophisticated malvertising campaigns, users are advised to:
– Exercise Caution with Online Ads: Be skeptical of advertisements offering free or premium access to financial services, especially those that prompt immediate downloads.
– Verify Sources: Always download software from official websites or trusted app stores.
– Maintain Updated Security Software: Ensure that antivirus and anti-malware solutions are up to date to detect and prevent infections.
– Educate Yourself on Phishing Tactics: Stay informed about common social engineering techniques to recognize and avoid potential threats.
By remaining vigilant and adopting these best practices, users can protect themselves from falling victim to such deceptive and harmful campaigns.