Google-Hosted Malvertising Leads To Fake Keepass Site That Looks Genuine

'Google has been caught hosting a malicious ad so convincing that there's a decent chance it has managed to trick some of the more security-savvy users who encountered it. From a report: Looking at the ad, which masquerades as a pitch for the open source password manager Keepass, there's no way to know that it's fake. It's on Google, after all, which claims to vet the ads it carries. Making the ruse all the more convincing, clicking on it leads to Äeepass[.]info, which, when viewed in an address bar, appears to be the genuine Keepass site. A closer look at the link, however, shows that the site is not the genuine one. In fact, Äeepass[.]info -- at least when it appears in the address bar -- is just an encoded way of denoting xn--eepass-vbb[.]info, which, it turns out, is pushing a malware family tracked as FakeBat. Combining the ad on Google with a website with an almost identical URL creates a near-perfect storm of deception. "Users are first deceived via the Google ad that looks entirely legitimate and then again via a lookalike domain," Jerome Segura, head of threat intelligence at security provider Malwarebytes, wrote in a post on Wednesday that revealed the scam. Information from Google's Ad Transparency Center shows that the ads have been running since Saturday and last appeared on Wednesday. The ads were paid for by an outfit called Digital Eagle, which the transparency page says is an advertiser whose identity has been verified by Google.' -- source: https://tech.slashdot.org/story/23/10/19/1724240 Cheers, Peter -- Peter Reutemann Dept. of Computer Science University of Waikato, Hamilton, NZ Mobile +64 22 190 2375 https://www.cs.waikato.ac.nz/~fracpete/ http://www.data-mining.co.nz/

On Fri, 20 Oct 2023 09:08:58 +1300, Peter Reutemann quoted:
'... clicking on it leads to Äeepass[.]info ...' ... -- source: https://tech.slashdot.org/story/23/10/19/1724240
Interesting how Slashdot keeps corrupting characters like that. Luckily, the original article <https://arstechnica.com/security/2023/10/google-hosted-malvertising-leads-to-fake-keepass-site-that-looks-genuine/> has it intact: Making the ruse all the more convincing, clicking on it leads to ķeepass[.]info, which, when viewed in an address bar, appears to be the genuine Keepass site. I did try visiting that site yesterday (before Firefox started flagging it as a phishing site), and the home page did come up OK, but none of the download links seemed to work.

I wrote:
I did try visiting that site yesterday (before Firefox started flagging it as a phishing site) ...
Ah, in fact it is Cloudflare doing the flagging (checked by using wget instead of Firefox to access the site). Though now I think Firefox is using “Google Safe Browsing” to add another warning on top of that.
participants (2)
-
Lawrence D'Oliveiro
-
Peter Reutemann