Cybercriminals Use Webex Brand to Target Corporate Users
The false advertisement has been left up for days, flying under the radar by managing to adhere to Google Ads' policies.
Threat actors are targeting corporate users who are interested in downloading Webex — by buying ad space from Google and impersonating Cisco.
Webex, the digital communications giant's Web conference software, has not itself been compromised, to be clear. The effort is a fairly straightforward malvertising campaign: When a user completes a Google search for the software, they are met with a seemingly real advertisement that is being used to distribute malware, specifically the BatLoader first-stage malware threat.
BatLoader, which as its name suggests downloads additional payloads on a compromised computer, is skilled in evading detection and "is part of the infection chain where it is used to perform the initial compromise."
The malicious, false advertisement adheres to Google Ads' policy for display URLs, exploiting a loophole known as a tracking template that is being abused as a filtering and redirection mechanism. The threat actors appear to be interested in corporate users, using malware that may not be detected by an organization's traditional antivirus measures.
"A more complete solution such as endpoint detection and response (EDR), coupled with an MDR service where human analysts review suspicious activities performed by the malware is a necessity," stated researchers at Malwarebytes Labs, who uncovered the campaign.
Google has been alerted regarding the false advertising incident.
About the Author
You May Also Like