Introduction
A sophisticated deceptive campaign [5] [6], termed “DeceptionAds,” has been uncovered, which manipulates users into downloading Lumma Stealer, a notorious infostealer malware. This malware targets sensitive information, including banking details and browser extensions, by exploiting vulnerabilities in the digital advertising ecosystem [1] [3].
Description
A large-scale deceptive campaign known as “DeceptionAds” has been identified, tricking users into installing Lumma Stealer [5] [6], a prominent infostealer malware that targets sensitive data, including banking information and browser extensions [2]. This campaign utilizes fraudulent captcha verification pages that mimic legitimate processes, prompting users to confirm their identity through keyboard clicks [5] [6]. This interaction inadvertently executes a PowerShell command that installs the malware. The operation exploits vulnerabilities in the digital advertising ecosystem through malvertising, exposing thousands of victims to risks such as credential theft and significant financial losses [3].
The campaign propagates malicious fake captcha pages via the Monetag advertising platform, a subsidiary of PropellerAds [1] [3] [5] [6], where threat actors register as website owners [4]. Users visiting websites that host pirated movies or other risky content encounter these deceptive pages [7], where they are misled into completing a captcha that triggers the malware installation. This method exploits users’ instincts to quickly resolve perceived issues [2], making them more susceptible to falling for these scams [2].
Key findings from the investigation reveal that the campaign achieves extensive reach [3], generating over 1 million daily ad impressions across a network of more than 3,000 publisher sites [4]. The malware delivery mechanism involves redirect chains and obfuscated scripts that distribute the fake captcha pages through ad networks [1] [3]. Attackers employ sophisticated cloaking techniques [1] [3], utilizing services like BeMob for ad tracking to conceal their malicious intent from moderators [1] [3]. The final redirect often leads to the fake captcha page [5], which is frequently hosted on various cloud services.
The infrastructure of ad networks plays a crucial role in enabling such campaigns [1] [3], as fragmented accountability allows malvertising operations to thrive. Monetag’s ad scripts utilize a Traffic Distribution System (TDS) to analyze visitors and optimize ad placement [1] [3], which attackers exploit to deliver malicious content on a large scale [1] [3]. This situation is exacerbated by the ability of attackers to swap benign creatives for malicious ones post-approval, highlighting a significant conflict of interest that creates security gaps for users [3].
Following the campaign’s disclosure [1], Monetag and BeMob have banned over 200 accounts associated with the malicious activity [1] [3]. Despite these actions [4], the campaign has shown signs of resurgence as of December 5, 2024 [4]. Researchers stress the importance of proactive measures [1] [3], including enhanced verification processes [4], continuous content moderation [1] [3] [4], and improved oversight of ad network participants [4], to prevent future abuses and mitigate similar threats.
Conclusion
The “DeceptionAds” campaign underscores the significant risks posed by malvertising, including potential financial losses and data breaches. While actions have been taken to curb the campaign, its resurgence highlights the need for ongoing vigilance and improved security measures within the digital advertising ecosystem. Enhanced verification [4], continuous moderation [1] [3] [4], and stringent oversight are crucial to safeguarding users and preventing similar threats in the future.
References
[1] https://www.infosecurity-magazine.com/news/fake-captcha-campaign-risks/
[2] https://ktar.com/story/5636945/scam-yourself-attacks-cyber-crime/
[3] https://osintcorp.net/fake-captcha-campaign-highlights-risks-of-malvertising-networks/
[4] https://tnsafety.com/massive-malvertising-campaign-exploits-ad-networks-with-fake-captcha-scam
[5] https://www.hendryadrian.com/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of/
[6] https://www.infostealers.com/article/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-internet-advertising/
[7] https://rhyno.io/blogs/cybersecurity-news/new-malvertising-scheme-found-using-a-single-ad-network/




