

Multiple Fortinet Products Vulnerabilities
January 16, 2025
Malvertising Campaign Targets Google Ads Users to Steal Credentials and 2FA Codes
January 16, 2025
Multiple Fortinet Products Vulnerabilities
January 16, 2025
Malvertising Campaign Targets Google Ads Users to Steal Credentials and 2FA Codes
January 16, 2025Severity
High
Analysis Summary
Recent investigations into a cybersecurity incident by Researchers, have uncovered the deployment of a Python-based backdoor and RansomHub ransomware. The attack began with SocGholish (aka FakeUpdates), a JavaScript malware distributed via drive-by campaigns that lure victims into downloading fake browser updates. SocGholish is often propagated through legitimate websites compromised using black hat SEO techniques redirecting victims from search engine results.
According to the Researcher, upon execution, the malware contacts a command-and-control (C2) server to download additional payloads enabling threat actors to gain a foothold. Notably, SocGholish campaigns have exploited outdated WordPress SEO plugins such as Yoast (CVE-2024-4984) and Rank Math PRO (CVE-2024-3665).
In this case, the attackers used SocGholish to deploy the Python-based backdoor within 20 minutes of the initial infection. The backdoor, acting as a reverse proxy, connects to a hard-coded IP address establishing a SOCKS5-based tunnel for lateral movement through RDP sessions. The Python script continuously refined since December 2023, features surface-level obfuscation improvements to evade detection. Researchers noted the script’s polished, well-structured nature, suggesting the involvement of skilled developers or AI tools. The script incorporates error handling, verbose debugging, and descriptive methods, further indicating meticulous design or advanced tooling.

The attack highlights a broader pattern of pre-ransomware activity including disabling Endpoint Detection and Response (EDR) tools with utilities like EDRSilencer, stealing credentials with LaZagne, and brute-forcing email accounts with MailBruter. Additionally, threat actors have targeted cloud storage solutions, as seen with Codefinger’s abuse of AWS S3 buckets. By leveraging Amazon's Server-Side Encryption with Customer customer-provided keys (SSE-C), Codefinger securely encrypts data and implements deletion policies via the S3 Object Lifecycle Management API, pressuring victims to pay ransoms within seven days.
Further complicating defenses, phishing campaigns have adopted rapid-fire techniques, flooding inboxes with legitimate emails to overwhelm targets. Mimicking Black Basta’s methods, attackers exploit victims' confusion through phone calls or Teams messages, posing as tech support to convince them to install remote-access tools like AnyDesk or TeamViewer. These tools facilitate further intrusions allowing attackers to propagate malware and access sensitive data undetected. The convergence of sophisticated malware, ransomware, and social engineering tactics underscores the increasing complexity and coordination of modern cyber threats.
Impact
- Sensitive Credentials Theft
- Privilege Escalation
- Data Encryption
Indicators of Compromise
IP
92.118.112.208
23.227.193.172
37.1.212.18
108.181.115.171
173.44.141.226
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software on time and make it into a standard security policy.
- Employ network intrusion detection and prevention systems to monitor and block malicious network activities.
- Implement network segmentation to limit lateral movement for attackers within the network.
- Implement advanced email filtering to detect and block phishing emails.
- Employ updated and robust endpoint protection solutions to detect and block malware.
- Develop and test an incident response plan to ensure a swift and effective response to security incidents.
- Enhance logging and monitoring capabilities to detect anomalous activities and unauthorized access.
- Conduct regular security audits and penetration testing to identify and address potential vulnerabilities.
- Regularly back up critical data and ensure that backup and recovery procedures are in place.