Malvertising campaigns targeting IT staff are evolving, with the WorkersDevBackdoor and MadMxShell backdoors sharing significant connections. Recent tracking by ThreatDown has revealed that both malware payloads are distributed through overlapping malicious Google ads for IP scanners, indicating a coordinated effort among cybercriminals. Notably, the command and control infrastructure for MadMxShell can be linked directly to the delivery methods of WorkersDevBackdoor, highlighting a concerning overlap in their distribution networks.
MadMxShell is distributed via malicious ads and utilizes DLL hijacking for communication with its command and control server, while WorkersDevBackdoor employs a more complex installation method, packaging its payload in a password-protected archive. Both backdoors are capable of stealing sensitive data and facilitating initial access for ransomware deployment. The shared focus on IP scanner-related ads suggests a targeted approach aimed specifically at IT professionals.
The research also uncovered that many of the ads observed were associated with the same entity, known as goodgoog1e, which is tied to fraudulent advertiser accounts. This infrastructure not only distributes both payloads but also utilizes sophisticated techniques to obscure the malware’s delivery, such as rotating URLs and dynamic content delivery through platforms like Dropbox. Such tactics make detection more challenging for security systems.
Overall, the convergence of WorkersDevBackdoor and MadMxShell illustrates a growing trend in the malware landscape where distinct malware families can share resources and infrastructure. Understanding these connections is crucial for improving detection and response strategies against these threats. The findings emphasize the importance of vigilance among IT staff when navigating ads and downloading software, as the potential for malware infiltration continues to rise.