Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Malvertising Campaign Targets Slack in Google Search Engine

    Malvertising Campaign Targets Slack in Google Search Engine

    August 23, 2024

    A sophisticated Slack malvertising campaign targeting users has been found exploiting Google search ads to deliver malware. This stealthy attack highlights the evolving tactics of cybercriminals and the need for heightened vigilance among internet users.

    The campaign, which lasted several days, involved a suspicious ad for Slack appearing in Google search results. While initially harmless, the ad eventually led users through a complex chain of redirects, ultimately serving malware to unsuspecting victims.

    Slack Malvertising Campaign Manipulates Google Ads

    At first glance, the Slack malvertising ads seemed legitimate, even outranking the official Slack website in search results. However, upon closer inspection by researchers from MalwareBytes, it became clear that something was amiss, as the ad’s advertiser had been promoting products targeted at the Asian market while being displayed in an entirely different region.

    Source: www.malwarebytes.com/blog/

    The researchers were able to use contextualized detection, a technique they had used in the past to identify compromised advertiser accounts, to reveal that the ad was likely malicious. The ad had been labeled by the team as ‘cooking’ – a common practice where malicious ads are left idle for an initial duration to avoid triggering detection.

    The ad’s behavior eventually changed and redirected to a click tracker, which sent user traffic to a domain of the attacker’s own choosing and led to the final URL, slack-windows-download[.]com, that had been created just a week prior to the attack.

    Source: www.malwarebytes.com/blog/

    While visitors were initially shown a decoy page, the researchers discovered after tweaking settings that the malicious page could be revealed, which impersonated the official Slack page and offered a download link to unsuspecting victims. This behavior is known as cloaking, where different users are shown different content.

    The ad’s redirect chain was complex, involving a click fraud detection tool, followed by a click tracker, and finally, a cloaking domain. This deep layering made it difficult for the researchers to evaluate the ad without specialized tooling and knowledge of the threat actor’s tactics, techniques, and procedures (TTPs).

    Upon clicking the download button, a file download had been triggered from another domain, hinting at a parallel campaign targeting Zoom. Dynamic analysis revealed a remote connection to a server previously used by the SecTopRAT remote access Trojan, which has stealer capabilities.

    The threat actors behind this campaign employed several identified methods to avoid detection:

    Ad ‘cooking’: The malicious ad remained dormant for days, redirecting to legitimate Slack pages before activating its payload.
    Click tracking abuse: The attackers used click tracking services to obscure the final destination from Google’s security measures.
    Cloaking: Different content was served to different users, making it difficult to identify the malicious nature of the landing page.
    Multi-layered redirects: A series of redirects, including fraud detection tools and tracking links, further obfuscated the attack chain.

    Malware Delivery and Implications

    The final payload of the campaign, SecTopRAT, a remote access Trojan with data-stealing capabilities, is used by the attackers to firmly establish a connection to a command and control server, potentially compromising the systems and data of targeted victims.

    As malvertisers continue to exploit legitimate platforms and employ sophisticated evasion techniques, both individuals and organizations must remain vigilant against these tactics and employ multi-layered security approaches to protect against such threats.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleLatvian Hacker Extradited to U.S. for Role in Karakurt Cybercrime Group
    Next Article CISCO Requests Reconsideration of UN Convention Against Cybercrime

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47916 – Invision Community Themeeditor Remote Code Execution

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-2762 – CarlinKit CPC200-CCPA Root of Trust Failure Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Does your smartphone mysteriously wake up? 5 reasons why (that aren’t ghosts)

    Development

    North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS

    Development

    The 60 best Labor Day 2024 TV deals

    Development

    Highlights

    Development

    Empowering Risk and Regulatory Compliance Excellence

    April 29, 2024

    At the core of our business’s successes lie the brilliant minds and unwavering dedication of…

    Dirty Stream Flaw Present in Android Apps with Millions of Downloads

    May 3, 2024

    BSD Release: DragonFlyBSD 6.4.1

    May 1, 2025

    This LG wireless soundbar takes seconds to set up. And its sound blew me away

    June 18, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.