Explore our library of thought leadership articles and insights.
Podcasts
Stream informative and exclusive episodes of DomainTools “Breaking Badness” podcast.
Research
Read the latest from DomainTools Investigations.
Webinars
Watch live and on-demand cybersecurity training from the DomainTools team.
White Papers
Discover the real-world impact of DomainTools DNS intelligence.
Client Resources
Technical Documentation
Navigate DomainTools features effortlessly with our comprehensive guides.
API Documentation
Access everything you need, including endpoint, response formats, sample queries, and product service levels.
Webinars
Through close partnerships with leading security vendors, DomainTools embeds our best-in-class domain profiles and predictive Risk Score directly within your preferred SIEM, SOAR, and TIP solutions.
Watch Now
Company
About
Meet our exceptional executive team of experts and industry leaders.
Pressroom
Access the latest DomainTools news and press coverage.
Contact
We’re here to help with product info, pricing, and current and future account services.
In the past month, a number of malware families are using Google Ads to spread badness masquerading as legitimate downloads
These bad actors had been having success with phishing via Word Documents, but they made the shift to to Google Ads
This article makes the assertion that “malvertising” as it’s being called, has been around for quite a while.
Why are we seeing it recently? It’s a numbers game for anyone in any sort of business. They must be seeing they’re getting good results
There are a lot of anti-phishing measures in email gateways that catch old tricks
So why not look at diversifying?
You are paying for this service, but it’s likely they’re probably using others’ money
Which brands are affected by this?
We’ve seen Adobe Reader, Slack, Microsoft Teams, and a few others targeted for impersonation on Google Ads
We’ll likely see this expand to other brands
When you think about what the lure is for these, it’s usually about what the download will be - either for personal or business use
You find it with productivity tools, but you can also see instances of gaming downloads as well, so it’s safe to assume this will spread to others
The reporter for the article needed to draw the line somewhere - they can’t be expected to list all brands out ;)
This threat was reported by Sentinel One and is called MalVirt, but what does it do?
At the moment, it’s being used to distribute malware called XLoader, which runs on both Windows and macOS
XLoader *sounds* like its job is to download later post-exploit tooling, but it mainly seems to be stealing credentials and other sensitive information from infected devices at this point
One of the interesting things in this article was the main download site they mention, downloadstudio[.]net, did something that very few malicious domains accomplish: it’s well inside the top million domains, per our ranking algorithm that replaces the erstwhile Alexa service. It’s 124k and change and it’s been around since 2019
Why doesn’t Google just fix this?
They’re probably getting better at it over the years, but so are bad actors - it’s a cat and mouse thing
How can folks protect themselves?
Basically just stop using the Internet other than listening to Breaking Badness
Everything was fine when we were using phone books ;)
In all seriousness, we’ve been leery of sponsored links
If there’s a specific brand associated with the link, check the domain
We try to go past those links to the organic results
If you have to download Microsoft Teams (as an example), just go to their website and download it from there
Of course, not every sponsored link is bad, but you really have to be mindful of what you’re clicking on
Hackers are using Microsoft OneNote attachments in phishing emails to spread malware and password stealers
So what is Microsoft OneNote?
It’s the Microsoft standard note taking tool that allows you to add images, videos, links, visuals, and more
It’s installed instantly with Microsoft Office
There’s been an uptick recently, but ProofPoint would say this has been going on since December 2022 - still a fairly new attack
We’ve seen similar attacks in the past to other tools, but now we’re just seeing it with OneNote
ProofPoint believes we’re seeing this uptick with OneNote as bad actors have experimented with different techniques to avoid detection
December was a popular month to begin these attacks as some of the messages in the campaign alluded to “Christmas bonuses” or “Christmas gifts” making it more enticing to the victim
The targets in December were primarily those in the Education sector, while attacks in January didn’t have specific targets or organizations
The ProofPoint team noted that the campaigns deliver AsyncRAT malware, Redline, AgentTesla, and DOUBLEBACK
What’s the best way for people to protect themselves?
There’s simple things to turn on to block access
But a lot of this is getting picked up, so that’s good news
ProofPoint stresses that these attacks are only successful if potential victims actually engage with the attachment, so organizations need to educate their users on these threats and to report suspicious emails and attachments
Two Truths and a Lie
Introducing our newest segment on Breaking Badness. We are going to play a game you are all likely familiar with called two truths and a lie, with a fun twist. Each week, one us with come prepared with three article titles, two of which are real, and one is, you guessed it, A LIE.
You'll have to tune in to find out!
Current Scoreboard
This Week’s Hoodie/Goodie Scale
MalVirtuoso
[Taylor]: 2.5/10 Hoodies [Tim]: 3.5/10 Hoodies
One Love for OneNote
[Taylor]: 3.5/10 Hoodies [Tim]: 4/10 Hoodies
That’s about all we have for this week, you can find us on Twitter @domaintools, all of the articles mentioned in our podcast will always be included on our podcast recap. Catch us Wednesdays at 9 AM Pacific time when we publish our next podcast and blog.
*A special thanks to John Roderick for our incredible podcast music!