Generative Data Intelligence

Cybercriminals Use Webex Brand to Target Corporate Users

Date:

Threat actors are targeting corporate users who are interested in downloading Webex — by buying ad space from Google and impersonating Cisco.

Webex, the digital communications giant’s Web conference software, has not itself been compromised, to be clear. The effort is a fairly straightforward malvertising campaign: When a user completes a Google search for the software, they are met with a seemingly real advertisement that is being used to distribute malware, specifically the BatLoader first-stage malware threat.

BatLoader, which as its name suggests downloads additional payloads on a compromised computer, is skilled in evading detection and “is part of the infection chain where it is used to perform the initial compromise.”

The malicious, false advertisement adheres to Google Ads’ policy for display URLs, exploiting a loophole known as a tracking template that is being abused as a filtering and redirection mechanism. The threat actors appear to be interested in corporate users, using malware that may not be detected by an organization’s traditional antivirus measures.

“A more complete solution such as endpoint detection and response (EDR), coupled with an MDR service where human analysts review suspicious activities performed by the malware is a necessity,” stated researchers at Malwarebytes Labs, who uncovered the campaign.

Google has been alerted regarding the false advertising incident.

Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

spot_img

Latest Intelligence

spot_img

Chat with us

Hi there! How can I help you?