#malvertizing

Quad9DNSquad9dns
2026-02-03

The latest Quad9 Trends report with insights from our Director of for H2 2025 👉 quad9.net/news/blog/trends-h2-

Graphic of the "Quad9 H2 2025 Cyber Insights Report" featuring a tech-inspired background with circuit-like designs.
2025-09-04

« Campaigns driving tens of millions of views to adult or phishing sites in just days. » #x #ai #grokking #web #porn #malvertizing #online #phishing #future #threats [ gbhackers.com/hackers-exploit- ] #informatique

2025-01-22 (Wednesday): Traffic Analysis Exercise: Download from fake software site

I've posted a traffic analysis exercise based on the same type of #Malvertizing I wrote about for my employer at linkedin.com/posts/unit42_2025 and x.com/Unit42_Intel/status/1882

Details on that infection are at: github.com/PaloAltoNetworks/Un

The exercise infection happened on the same day, but it's based on a site impersonating Google Authenticator instead of Microsoft Teams.

The exercise #pcap is at malware-traffic-analysis.net/2

Screenshot of fake Google Authenticator site seen on 2025-01-22 sending a malicious file to download.
Matt WillemsenNonog@fedibird.com
2023-11-03

Malvertising via Dynamic Search Ads delivers malware bonanza
Most, if not all malvertising incidents result from a threat actor either injecting code within an existing ad, or intentionally creating one. Today, we look at a different scenario where, as strange as that may sound, malvertising was entirely accidental.
The reason this happened was due to the combination of two separate factors: a compromised website and Google Dynamic Search Ads.
malwarebytes.com/blog/threat-i #malvertizing #DynamicSearchAds #accident

Matt WillemsenNonog@fedibird.com
2023-02-05

Until further notice, think twice before using Google to download software - Over the past month, Google has been outgunned by malvertisers with new tricks. “Threat researchers are used to seeing a moderate flow of malvertising via Google Ads,” volunteers at Spamhaus wrote on Thursday. “However, over the past few days, researchers have witnessed a massive spike affecting numerous famous brands, with multiple malware being utilized. This is not ‘the norm.’” | Ars Technica bit.ly/3wTySbY
#malvertizing #software #google #download

2023-01-17

Sophos has observed new IcedID #malvertizing campaigns themed around adobe & other popular software packages

🧊​ Infection Chain:

➡️​ Google search for "adobe reader"
↪️​ Google ad click
↪️​ TDS redirect: `likhs299us[.]tech`
🎣​ Fake website: vvw-adobe[.]top
↪️​ Download of malware from firebase (.zip containing a .iso)
🗄️​ Setup_Win_<timestamp>.zip / Setup_Win_<timestamp>.iso

#IcedID C2: plivetrakoy[.]com

#IOCs:
🔗​ virustotal.com/gui/file/be9ac5
🔗​ virustotal.com/gui/ip-address/
#ThreatIntel #Malware #CTI

Fake Adobe website used to download IcedID malware
bencrypted@localhost:~$|bencrypted@infosec.exchange
2022-12-13

Sophos has observed new #IcedID activity stemming from malvertizing.

Infection Chain:
➡️ Google search for “slack”
↪️ Malicious ad click #malvertizing
↪️ Redirect 1: dasaert[.]fun/slack/index[.]php
↪️ Redirect 2: www-slack[.]top/downloads/windows/ (Registrar: AS29470 🇷🇺)
➡️ Download: setup_win_13-12-2022_17-15-46.zip, which contained the file setup_win_13-12-2022_17-15-46.msi

Rundll32 was then invoked, referencing a DLL staged under %APPDATA%\Local\Temp\tmp*.dll

Connections initiated with the C2 server: 143.198.92[.]88 (resolving to domain estrabornhot[.]com)

Seemingly related lure sites can be found via URLScan - urlscan.io/search/#www-*.top

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst