skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
Bitdefender Reports Malicious Ad Campaigns Distributing Malware

Bitdefender Reports Malicious Ad Campaigns Distributing Malware

/ 4 min read

Quick take - Bitdefender Labs is monitoring malicious advertising campaigns that exploit online platforms, particularly Facebook, to distribute malware disguised as legitimate applications, including a fraudulent Bitwarden browser extension targeting users in Europe.

Fast Facts

  • Bitdefender Labs is monitoring malicious ad campaigns that exploit online platforms to distribute malware, particularly targeting users with deceptive ads for fake applications.
  • A notable campaign impersonates the Bitwarden password manager, using Facebook ads to create urgency for users to install a fraudulent “security update.”
  • Users who click on these ads are redirected to phishing pages mimicking the Chrome Web Store, leading to the installation of a malicious browser extension that collects sensitive data.
  • The malicious extension requests extensive permissions, allowing it to intercept online activities and gather personal information, including Facebook data and credit card details.
  • Security experts recommend verifying updates through official sources, scrutinizing ads, and using tools like Bitdefender’s Scamio and Scam Copilot for enhanced protection against such threats.

Bitdefender Labs Monitors Malicious Advertising Campaigns

Bitdefender Labs is actively monitoring a series of malicious advertising campaigns that exploit popular online platforms to distribute malware. These campaigns use deceptive advertisements to lure users into installing harmful software disguised as legitimate applications or updates.

Fraudulent Bitwarden Extension Campaign

One particularly concerning campaign identified by Bitdefender involves a fraudulent Bitwarden browser extension being promoted on Facebook. The attackers are leveraging Facebook’s advertising platform to deliver ads that appear legitimate, ultimately redirecting users to malicious websites. This specific campaign impersonates Bitwarden, a widely recognized password manager, and creates a sense of urgency by urging users to install a supposed “security update.” Launched on November 3, 2024, the campaign primarily targets consumers aged 18 to 65 in Europe. The malicious ads have already reached thousands of users and have the potential for global expansion.

Users who click on these ads are redirected through multiple intermediary sites, eventually landing on a phishing page that closely resembles the official Chrome Web Store. The deceptive ads claim that users’ passwords are at risk, prompting immediate action to update their Bitwarden extension. By using Bitwarden’s branding and urgent language, the attackers aim to induce panic.

Installation Process and Data Collection

Once users click on the ad, they are directed to a fake webpage that mimics the official Chrome Web Store, where they are misled into downloading a malicious extension. The installation process involves users unzipping a file and enabling Developer Mode in their browser. This allows the malicious extension to request extensive permissions that enable it to intercept and manipulate online activities. The extension’s manifest file includes permissions to operate on all websites and modify network requests, effectively giving it the ability to access and manipulate user data.

Upon installation, the extension’s background script activates and begins collecting data. It checks for Facebook cookies and gathers additional information, including IP addresses and geolocation data. Moreover, it retrieves user data through Facebook’s Graph API, which may include personal details, business account information, and even credit card details. This collected data is then sent to a Google Script URL, functioning as the command-and-control server for the cybercriminals.

Recommendations for Users

This campaign highlights the challenges of detecting and mitigating such attacks, as they exploit trusted platforms to compromise user security by imitating reputable tools and employing urgent notifications. Security professionals recommend monitoring suspicious permissions and behavioral signatures as indicators of compromise. Users are advised to verify extension updates through official browser stores and to scrutinize advertisements and links before clicking on them. It is also important to review extension permissions prior to installation and enable browser security features to prevent unauthorized installations. Reporting suspicious ads on social media platforms can help mitigate the spread of similar attacks.

For added protection, users are encouraged to utilize reliable security solutions, such as Bitdefender’s Scamio tool, which detects scams and malicious ads while browsing or interacting on social media. Scamio analyzes various forms of content, including texts, links, and images, to identify potential scams. This tool is available on multiple platforms, including Facebook Messenger, WhatsApp, web browsers, and Discord. Additionally, Bitdefender has introduced a new feature called Scam Copilot, which aims to provide comprehensive scam protection across devices, further enhancing user security in the face of these evolving threats.

Original Source: Read the Full Article Here

Check out what's latest