Nitrogen Malware Spreads Through Malicious Ads

alerts pop-ups

Hackers have devised a cunning plan dubbed "Nitrogen" to trap IT professionals using fake advertisements, also known as "malvertisements," that appear on popular search engines. These malicious ads are designed to lead unsuspecting IT experts to compromised websites and phishing pages that imitate legitimate download portals for widely used software like AnyDesk, Cisco AnyConnect, TreeSize Free, and WinSCP.

When IT professionals click on these ads, they unwittingly download the intended software alongside a concealed Python package containing initial access malware. This allows the hackers to later launch more severe ransomware attacks. The campaign has been identified by researchers from Sophos, who have observed its presence in various technology companies and nonprofits across North America. Although no successful attacks have been reported yet, the researchers warn that multiple brands have been co-opted for similar malvertising efforts in recent months.

The hackers' choice to target IT professionals directly is a strategic move, according to Christopher Budd, director of Sophos X-Ops. By focusing on those who manage an organization's most sensitive systems, the attackers increase their efficiency and effectiveness in infiltrating the corporate network.

Once an IT pro falls into the trap, they may end up on a phishing page that convincingly mimics the authentic download page for their desired software. For example, a link like "winsccp[.]com" with an additional "c" subtly inserted to deceive visitors. In some instances, compromised WordPress sites are used, giving the appearance of legitimacy while delivering the malware-laden software.

Nitrogen Comes in Trojanized ISO

Upon clicking the "download" button, a trojanized ISO installer is deployed, which includes a malicious dynamic link library (DLL) file. While this DLL does contain the desired software, it also contains the initial access malware. Subsequently, the hackers establish a connection to their command and control infrastructure, deploying a shell and a Cobalt Strike Beacon on the infected computer. This allows them to maintain persistence and execute remote commands.

Despite the risks of targeting technically adept IT professionals, the hackers see the potential rewards as worthwhile. Since IT personnel have close proximity to sensitive systems within a corporate network, the attackers believe their efforts will pay off, even if the hit rate is relatively low.

While specific intentions of the attackers remain unclear, similar campaigns in the past have led to ransomware attacks, such as the deployment of BlackCat ransomware through the malvertising-enabled access. The overall goal appears to be gaining control of critical systems and holding them hostage for financial gain or other malicious purposes.

July 27, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.