• All Articles

AdSecure Malvertising news update! Malware and Unwanted-programs Trojan attacks

By Anna

July 4, 2024

AdSecure Malvertising news update

Malvertisers are constantly thinking of new harmful tactics to target unaware end users across the globe, taking them entirely by surprise, creating mMalicious Google ad campaigns with Unwanted-Programs and Malware. This is why at AdSecure we continuously work to improve our platform’s Ad Security tech to bring you, the best and most advanced tools. We also strive to create useful content to keep you up-to-date on news and developments in the Malvertising world.

On this AdSecure Malvertising news update, we bring you fresh news about 2 malicious Advertisers who used Trojan Malware and Unwanted-programs Trojan attacks in June 2024, including the Poseidon trojan Malware attack designed to steal and resell end user information. We will also tell you how to prevent Powershell Unwanted-programs attacks and how to stop Poseidon Trojan Malware attacks by using the right prevention software!

#1 AdSecure Malvertising news update: Unwanted-programs Trojan attacks June 2024 installers leading to Oyster backdoor attack

Wondering how to stop Poseidon Trojan Malware attacks and Unwanted-programs Malware? Unwanted-programs violations consist of an executable file or mobile app disguised as a legitimate programs download pack that, once downloaded, triggers harmful actions that impair the end user’s safety and that of their device. Within the Unwanted-programs category we can find Adware, Browser hijackers, Spyware, Keyloggers and other harmful code. A lot of the times such attacks are spread through a Malicious Google ad campaign with Unwanted-programs embedded in it!

This past June 2024, through a Malvertising campaign using Unwanted-Programs Trojan attacks installers for Microsoft Teams, Google Chrome, and other well-known software, the following Malvertiser delivered an Oyster backdoor attack, also known as Broomstick. The end users were lured to download a installer pack from legitimate-looking Phishing websites. The installer pack then automatically deployed the Oyster Malware, and without needing a specialized payload loader.

Oyster backdoor attacks are known to execute Malware with remote code execution as well as host data removal and command-and-control communication. According to SC Media, the installed Microsoft Teams software was riddled with PowerShell malicious code designed to hide the attack from the end user entirely. This means that this tactic could go completely undetected and remain installed in the end user’s device for long periods of time - This is a big reason Trojan Unwanted-program are dangerous for the end user!

#2 Malvertising news update: How to stop Poseidon Trojan Malware attacks

Malware is one of the most widely known Ad Security violations, and it often contains threats such as Trojans viruses. Why is Trojan Unwanted-programs dangerous for the end user? This form of Malvertising scam hides malicious scripts in an ad. It can include viruses, worms and Trojan attacks that target end users to infect their devices and steal their data. It can disrupt computer operations, gather sensitive information, gain access to private systems, or display unwanted ads. Malware is the base of the following Poseidon trojan Malware attack described below.

On this second AdSecure Malvertising news update June 2024, and for the second time this year, the Arc Browser is being used by Malvertisers to target end user information. In this case, Malvertiser Rodrigo4 is targeting Mac users, launching a fake Malvertising Google ad campaign infected with Poseidon Trojan Malware attacks, with the aim of harvesting account credentials and VPN configurations in order to resell to third parties. He named the campaign “Poseidon”, which according to sources, was actually a rebrand of an earlier malicious payload that Rodrigo4 created, the OSX.RodStealer. The browser’s stable macOS version was just released a couple of weeks ago, making the choice to target Arc’s new Mac users an obvious pattern for Poseidon Trojan Malware attack distributors (stable iOS was released on February 2nd). 

As orchestrated by the Malvertiser, the end user would be lured to click on a realistic-looking Malicious Google ad campaigns with unwanted software for the Arc browser. This would lead them to arc-download.com, a bogus website offering Arc for Mac devices. If the end users decided to click on the compromised download, instead of Arc, they would end up downloading a malicious DMG file that resembled a legitimate installer, which would then install a Windows RAT (Remote Access Trojan). With it, Rodrigo4 could remotely extract end user information. Which is why Trojan attacks are dangerous for the end user. Continue reading to find out how to stop Poseidon Trojan Malware attacks.

The dangers of Unwanted-programs Trojan attacks in June 2024 

Like many other ad platforms, Google is susceptible to Malvertisers swapping legitimate URLs on ad campaigns with malicious ones post-launch, thus bypassing pre-launch ad security checks. An added problem to Google is that it allows bad actors to promote malicious search ads displaying legitimate URLs, which however, once clicked, redirect end users to wherever the Malvertiser wants them to go, generally a malicious landing page. This gives Malvertisers the perfect opportunity to infiltrate dangerous threats such as Unwanted-programs Trojan attacks in June 2024, creating a malicious Google ad campaign with Unwanted-programs, Trojan malware, or any other threats.

Beware of malicious Google ad campaigns with Unwanted-programs!

Malicious Google ad campaigns with unwanted-programs usually contain Trojan Malware. Trojans are malicious executable programs that disguise themselves as legitimate files, making them very difficult to detect. They are a type of Malware that hides within a legit file, with the goal of accessing end user devices. They are mainly used to steal end user data or spy on their computing activities, infect their devices or other programs, and even gaining access to bank accounts and other portals sensitive to monetary theft! Aside from being found in Unwanted-Program and Malware attacks, they can also be found in Phishing attacks and other harmful Malvertising tactics. This is why it is important to remove infostealer Trojan malware from Ad Networks. 

Why is Trojan Unwanted-programs dangerous for the end user?

This is why Trojan Unwanted-programs is dangerous for the end user. There are several kinds of Trojan attacks and Malicious google ad campaigns with unwanted software, including:

  • Infostealer Trojan: It harvests sensitive data from the end user's device, like passwords, bank information, personal files, etc.
  • Backdoor Trojans: They grant Malvertisers unauthorized access and enable them to control the system, steal data, and sneak in more Malware.
  • Remote Access Trojan (RAT): The Malvertiser gains complete control over the end user’s device, remotely.
  • Distributed Denial of Service (DDoS) Attack Trojans: This threat performs DDoS attacks, flooding a network with traffic to overwhelm and crash it.
  • Downloader Trojan: It downloads unwanted malicious content into the end user’s compromised device.

As you can see in this Unwanted-programs trojan attacks in June 2024 AdSecure Malvertising news update, there are many ways in which Trojans can compromise end user security. So, now that you know why Trojan Unwanted-programs is dangerous for the end user, it is time to understand how to stop Poseidon Trojan Malware attacks. And because of their stealth, Trojan attacks can be more dangerous than other Malware threats, being used to secretly infiltrate the end users’ systems and execute malicious actions, completely undetected. Which means that using especialized Malware and Malvertising monitoring and removal software is key!

Remove Infostealer Trojan Malware from your Ad Network with AdSecure

We hope that this Unwanted-programs trojan attacks in June 2024 AdSecure Malvertising news update has been very helpful. With malicious malvertising attempts similar to the Poseidon trojan Malware attack, every day end user information is spied on, stolen and sold by the hands of Malvertisers infiltrating Ad Platforms and Websites to fulfil their malicious goals. If you are an Ad Network or website Publisher, it is your responsibility to keep them safe, also protecting the integrity of your brand.

So it is time to act! Let us help you remove Infostealer Trojan Malware from your Ad Network with AdSecure software, and start preventing Powershell Unwanted-programs attacks on your website now! 

And also, prevent Powershell Unwanted-programs on your website now!

Work with a Malvertiser detection and blocking tool such as AdSecure, which allows you to monitor your ads in real-time, pre and post-launch. Get in touch with us to organize a meeting with our team, or why not sign up for a Free Trial now?

Share this article on


Anna

Blog