A new adware campaign is deceiving users searching for the Meta Quest (formerly Oculus) application for Windows, leading them to download a malicious adware called AdsExhaust. Cybersecurity firm eSentire reported that this adware can exfiltrate screenshots, simulate keystrokes, and interact with browsers to automatically click ads or redirect to specific URLs, thereby generating revenue for its operators.
The infection process starts with a fake website (“oculus-app[.]com”) appearing in Google search results due to SEO poisoning. Visitors are tricked into downloading a ZIP file that contains a Windows batch script. This script fetches additional scripts from a command-and-control server, creates scheduled tasks, and downloads legitimate apps alongside other scripts designed to gather system information, capture screenshots, and exfiltrate data to a remote server.
The AdsExhaust adware then checks if Microsoft Edge is running and, if the system is idle, injects clicks, opens new tabs, and navigates to URLs embedded in the script. It also performs random scrolling to trigger ads and can close the browser if user interaction is detected. Additionally, it creates overlays to hide its activities and searches for keywords to perform Google searches, further inflating ad revenue.
The attack’s sophistication is underscored by the use of YouTube videos and bots to promote the fake site, giving it an appearance of legitimacy. This mirrors other recent cyber threats, including a malspam campaign in Italy that delivers a Java-based remote access trojan (Adwind) via malicious invoice-themed ZIP files. The case highlights the increasing complexity of social engineering tactics and the importance of verifying the authenticity of online solutions.
Reference: