Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Global Malvertising Campaign: A Lurking Threat to Personal Data



A large-scale malvertising campaign has compromised over 1 million devices worldwide, leaving users vulnerable to information theft and other malicious activities. Microsoft's threat intelligence team has sounded the alarm on this global threat, urging individuals and organizations to take proactive steps to protect themselves against such attacks.

  • Over 1 million devices worldwide have been compromised in a large-scale malvertising campaign.
  • A sophisticated redirection chain with four to five layers is being used to steal sensitive information from victims.
  • The attack involves system discovery, information gathering, and deployment of additional programs like Lumma Stealer and Doenerium.
  • GitHub has been identified as a critical component in this attack vector, with attackers using it to deliver initial access payloads.
  • PowerShell scripts are being used to download NetSupport RAT, identify installed applications and security software, and exfiltrate data.



  • Microsoft has sounded the alarm on a large-scale malvertising campaign that has compromised over 1 million devices worldwide, leaving users vulnerable to information theft and other malicious activities. The tech giant's threat intelligence team detected this massive cyberattack in early December 2024 as part of what it dubbed Storm-0408, an umbrella moniker for a group of threat actors known to distribute remote access or information-stealing malware via phishing, search engine optimization (SEO), or malvertising.

    At the heart of this campaign lies a sophisticated redirection chain comprising four to five layers, with the initial redirector embedded within an iframe element on illegal streaming websites serving pirated content. This malicious setup serves as a foothold for attackers to establish control over compromised devices, allowing them to execute a series of follow-on payloads designed to steal sensitive information.

    The attack sequence is a multi-stage process that involves system discovery, information gathering, and the deployment of additional programs like Lumma Stealer and Doenerium. These dropper malware components are responsible for deploying further malicious payloads such as NetSupport RAT and AutoIT scripts, which in turn serve as conduits for more data theft.

    Microsoft has identified GitHub as a critical component in this attack vector, with attackers utilizing the code hosting service to deliver initial access payloads. In at least two isolated instances, these payloads have been found hosted on Discord and Dropbox. The GitHub repositories have since been taken down, although it remains unclear how many of them were removed by Microsoft.

    Furthermore, the attack employs a variety of PowerShell scripts to download NetSupport RAT, identify installed applications and security software, specifically scanning for the presence of cryptocurrency wallets, indicating potential financial data theft. These malicious scripts also incorporate the use of "living-off-the-land binaries and scripts" (LOLBAS), such as PowerShell.exe, MSBuild.exe, and RegAsm.exe, for C2 and data exfiltration purposes.

    Microsoft's discovery of this large-scale malvertising campaign underscores the ever-evolving nature of cyber threats. The indiscriminate impact on organizations and industries, including both consumer and enterprise devices, highlights the need for heightened vigilance among users and administrators alike.

    The scenario serves as a stark reminder that even seemingly innocuous online activities can serve as vectors for malicious attacks. As the threat landscape continues to evolve, it is essential that individuals and organizations remain vigilant and take proactive steps to protect themselves against such threats.

    In light of this latest development, cybersecurity experts are advised to monitor their systems closely for any signs of suspicious activity and implement robust security measures to safeguard personal data. By doing so, they can mitigate the risk of falling prey to these sophisticated cyberattacks and maintain a secure digital environment.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-Global-Malvertising-Campaign-A-Lurking-Threat-to-Personal-Data-ehn.shtml

  • https://thehackernews.com/2025/03/microsoft-warns-of-malvertising.html

  • https://www.bleepingcomputer.com/news/security/microsoft-says-malvertising-campaign-impacted-1-million-pcs/


  • Published: Fri Mar 7 09:31:12 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us