SecurNerd
    What's Hot

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    SecurNerd
    • Home
    • AI
    • General News
    • Science
    • Tech
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Cyber Attacks»New Nitrogen malware pushed via Google Ads for ransomware attacks
    Cyber Attacks

    New Nitrogen malware pushed via Google Ads for ransomware attacks

    securnerdBy securnerdJuly 27, 2023Updated:July 27, 202303 Mins Read221 Views
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Reddit Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A new type of initial access malware, dubbed ‘Nitrogen’, has surfaced, exploiting Google and Bing search ads to propagate fraudulent software sites that distribute Cobalt Strike and ransomware payloads to unsuspecting users. The primary objective of the Nitrogen malware is to provide threat actors a foothold into corporate networks, facilitating data theft, cyberespionage, and the eventual deployment of the BlackCat/ALPHV ransomware.

    Sophos, a British security software and hardware company, published a comprehensive report on the Nitrogen campaign today. The report reveals that the campaign primarily targets technology and non-profit organizations in North America by mimicking popular software like AnyDesk, Cisco AnyConnect VPN, TreeSize Free, and WinSCP.

    eSentire, a global cybersecurity solutions provider, was the first to highlight the Nitrogen campaign in late June. Following this, Trend Micro delved into the post-compromise activities associated with WinSCP ads leading to BlackCat/ALPHV ransomware infections earlier this month. However, the latter report focused mainly on the post-infection stage and lacked comprehensive Indicators of Compromise (IoCs), as it was based on a single response incident.

    Under the Hood of the Nitrogen Malware Campaign

    The Nitrogen malware campaign commences when a user conducts a Google or Bing search for popular software applications. Depending on the targeting criteria, the search engine exhibits an advertisement promoting the searched software.

    Upon clicking the link, visitors are redirected to compromised WordPress hosting pages masquerading as legitimate software download sites. Only users from specific geographic regions are redirected to these counterfeit sites, where trojanized ISO installers (“install.exe”) are downloaded, which contain and sideload a malicious DLL file (“msi.dll”).

    The malicious DLL file serves as the installer for the “NitrogenInstaller” initial access malware, which, besides installing the requested app to avoid arousing suspicion, also installs a harmful Python package. The NitrogenInstaller sets a registry run key titled “Python” for persistence, pointing to a malicious binary (“pythonw.exe”) that executes every five minutes.

    Upon execution, the Python component runs “NitrogenStager” (“python.311.dll”), responsible for establishing communication with the threat actor’s C2, initiating a Meterpreter shell, and launching Cobalt Strike Beacons onto the victim’s system.

    Sophos analysts noted some instances where the attackers manually executed commands to retrieve additional ZIP files and Python 3 environments once the Meterpreter script was executed on the target system. The latter is required for running Cobalt Strike in memory, as NitrogenStager cannot execute Python scripts.

    Sophos has yet to ascertain the ultimate goal of the threat actors due to successfully thwarting observed Nitrogen attacks. Nevertheless, the infection chain indicates an attempt to stage the compromised systems for ransomware deployment. Notably, Trend Micro reported previously that this attack chain resulted in at least one case of BlackCat ransomware deployment.

    This campaign is not an isolated instance where ransomware gangs exploited search engine advertisements for initial access to corporate networks. Both the Royal and Clop ransomware operations have used similar tactics in the past.

    Users are advised to steer clear of “promoted” search engine results when downloading software and to download solely from the developer’s official site. Furthermore, downloads utilizing ISO files should be treated with suspicion as they are an uncommon method for distributing legitimate Windows software, typically provided in .exe or .zip formats.

    Update (7/27) – Google has responded to the campaign with the following statement:

    “Our policies strictly prohibit ads that distribute malicious software. The malware campaigns referred to in the report were detected by our teams before the report was published. We promptly removed the ads that contravened our policies and took suitable action on the advertisers’ accounts.”

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Ransomware Trending
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    securnerd
    • Website
    • Facebook
    • Twitter
    • Instagram

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Related Posts

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Top Posts

    Apple Takes Stand Against U.K. Surveillance Proposals, Considers Withdrawal of iMessage and FaceTime Services

    July 22, 20232,637 Views

    Apple’s Market Value Skyrockets by $71 Billion Amid Speculation of In-house ‘Apple GPT’ to Challenge OpenAI

    July 23, 2023894 Views

    Android Malware Developers Utilize Stealthy APK Compression to Bypass Detection Measures

    August 20, 2023810 Views

    Apple Store Blocks Twitter’s iOS App Rebranding to ‘X’ Due to Minimum Character Regulations

    July 29, 2023760 Views
    Don't Miss
    2 Mins Read

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    By securnerdDecember 8, 2023

    Google recently unveiled Gemini, its latest suite of powerful AI models, but the tech giant…

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 2023
    Stay In Touch
    • Facebook
    • Twitter
    • Instagram
    • LinkedIn
    • Telegram
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Popular Post

    Microsoft’s Ongoing Struggles with Cybersecurity: A $2.4 Trillion Giant’s Failures

    September 23, 20231 Views

    Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes

    September 25, 20231 Views

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 20231 Views

    Ethos Technologies Data Breach Settlement Offers Compensation of Up to $5,200 for Affected Individuals

    September 23, 20232 Views

    New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks

    September 24, 20232 Views

    Nigerian Man Admits Guilt in $6 Million Business Email Compromise Scheme

    September 24, 20233 Views

    Microsoft Unveils Security Copilot Early Access Program, Revolutionizing Threat Response

    October 23, 20233 Views

    Meta Introduces Ad-Free Subscriptions in Europe, Adapting to Privacy Regulations

    October 31, 20234 Views

    Ukraine Enhances Wartime Efforts Through Advanced Cyber Intelligence Strategies

    August 10, 20235 Views

    Critical Security Flaws Exposed in Nagios XI Network Monitoring Software

    September 20, 20235 Views
    Facebook Twitter Instagram LinkedIn Telegram
    © 2023 SecurNerd. Powered by Codelivly.

    Type above and press Enter to search. Press Esc to cancel.