Hackers from the financially motivated Russian group FIN7 have been exploiting Google’s sponsored ads to deliver malicious payloads to unsuspecting users. By impersonating reputable brands such as AnyDesk, WinSCP, and Google Meet, they have misled users into downloading fake browser extensions. These extensions are cleverly disguised as legitimate signed MSIX files from fictitious companies like “SOFTWARE SP Z O O” and “SOFTWARE BYTES LTD.” This method effectively dupes users into believing the downloads are safe, increasing the likelihood of successful malware infections.
eSentire’s Threat Response Unit (TRU) detected multiple incidents involving this deceptive strategy by FIN7. The group utilized these sponsored ads to serve as an entry point for their multi-stage infection chain, beginning with the download of a NetSupport Remote Access Trojan (RAT) and DiceLoader malware. Once executed, these programs perform various malicious activities including system reconnaissance and data exfiltration.
During their investigation, eSentire’s team discovered that once the NetSupport RAT was installed, it collected detailed system information and communicated with command-and-control servers using specifically crafted URLs. The malware’s ability to manipulate computer settings allowed FIN7 to execute additional malicious tasks, such as exporting Active Directory data using common system tools and dropping further payloads encrypted in memory.
The rapid response from eSentire’s 24/7 Security Operations Centers, staffed by elite threat hunters and analysts, was crucial in mitigating the threat posed by these attacks. The company successfully revoked the malicious certificates issued by GlobalSign, curtailing the spread of the malware. This case underscores the importance of continuous monitoring and rapid threat response in protecting against sophisticated cyber-attacks that exploit trusted online platforms.