Press ESC to close

Malicious ad distributes SocGholish malware to Kaiser Permanente employees

Category Details
Threat Actors Unknown (Phishing actors targeting Kaiser Permanente), SocGholish operators.
Campaign Overview Malicious Google Search Ads targeting Kaiser Permanente employees to steal credentials or infect systems via SocGholish malware.
Target Regions (Victims) U.S.-based employees searching for Kaiser Permanente HR portal.
Methodology Google Search Ads with malicious redirects, compromised websites, phishing templates, and malware-laden scripts (SocGholish).
Product Targeted Kaiser Permanente HR portal impersonation.
Malware Reference SocGholish malware (delivers Update.js script for fingerprinting and potential follow-up attacks, including Cobalt Strike).
Tools Used Google Ads platform, SocGholish malware framework, compromised website hosting phishing templates.
Vulnerabilities Exploited Compromised core JavaScript libraries on the Bellona Software website.
TTPs Ad-based phishing campaigns, compromised websites for phishing and malware delivery, SocGholish malware chain for targeted infections.
Attribution Phishing campaign actors and SocGholish operators acted independently, targeting overlapping victims.
Recommendations Avoid clicking on sponsored ads, use browser protection tools like Malwarebytes Browser Guard, monitor Google Ads transparency reports, update website libraries.
Source Malwarebytes

Read full article: https://www.malwarebytes.com/blog/news/2024/12/malicious-ad-distributes-socgholish-malware-to-kaiser-permanente-employees

The above summary has been generated by an AI language model

Stay Updated with Our Newsletter

Source: Malwarebytes

Published on: December 16, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *