Microsoft has uncovered a massive malvertising campaign that has compromised over a million devices globally. The attackers used malicious ads and compromised websites to distribute information-stealing malware, primarily targeting users of illegal streaming sites.
Microsoft Threat Intelligence has discovered a massive malvertising campaign that has impacted nearly a million devices worldwide. The campaign, active since December 2024, targets users visiting illegal streaming websites. It employs a multi-stage attack chain to deliver information-stealing malware.
The attackers cleverly exploit the user’s desire for free streaming content by embedding malicious redirectors within movie frames on these illegal sites. When a user clicks to play a video, they unknowingly trigger a series of redirects, ultimately landing on a malicious payload hosted on various platforms.
While GitHub was initially the primary platform for hosting the malicious files, Microsoft has also observed instances of malware being delivered via Dropbox and Discord. This highlights the attackers’ opportunistic approach and willingness to leverage various platforms to maximize their reach.
The malvertising campaign employs a complex, multi-stage attack chain to evade detection and maintain persistence on the victim’s device:
Microsoft has taken swift action to mitigate this threat, working with GitHub to take down the malicious repositories and providing detailed recommendations for users and organizations.Key recommendations include:
Read the full report from Microsoft Security to learn more about this malvertising campaign’s multi-stage attack chain.
This malvertising campaign serves as a stark reminder of the evolving threat landscape and the importance of proactive security measures. By understanding the attackers’ techniques and implementing the recommended mitigations, users and organizations can better protect themselves from falling victim to such attacks.