Original Article Text

Click to Toggle View

Trojanized CPU-Z app on fake Windows news site pushed by Google. A Threat actor has been abusing Google Ads to distribute a trojanized version of the CPU-Z tool to deliver the Redline info-stealing malware. The new campaign was spotted by Malwarebytes analysts who, based on the backing infrastructure, asses that it is part of the same operation that used Notepad++ malvertising to deliver malicious payloads. Campaign details The malicious Google advertisement for the trojanized CPU-Z, a tool that profiles computer hardware on Windows, is hosted on a cloned copy of the legitimate Windows news site WindowsReport. CPU-Z is a popular free utility that can help users monitor different hardware components, from fan speeds, to CPU clock rates, voltage, and cache details. Clicking the ad takes the victim through a redirect step that tricks Google’s anti-abuse crawlers by sending invalid visitors to an innocuous site. Those deemed valid to receive the payload are redirected to a Windows news site lookalike hosted on one of the following domains: The reason behind using a clone of a legitimate site is to add another layer of trust to the infection process, as users are familiar with tech news sites hosting download links for useful utilities. Clicking on the ‘Download now’ button results in receiving a digitally-signed CPU-Z installer (MSI file) containing a malicious PowerShell script identified as the ‘FakeBat’ malware loader. Signing the file with a valid certificate makes it unlikely that Windows security tools or third-party antivirus products running on the device will serve a warning for the user. The loader fetches a Redline Stealer payload from a remote URL and launches it on the victim’s computer. Redline is a powerful stealer able to collect passwords, cookies, and browsing data from a range of web browsers and applications, as well as sensitive data from cryptocurrency wallets. To minimize the chances of malware infections when looking for specific software tools, users should pay attention when clicking on promoted results in Google Search and check the if the loaded site and the domain match, or use an ad-blocker that hides them automatically.

Daily Brief Summary

MALWARE // Google Ads Exploited to Distribute Redline Malware via Fake CPU-Z App

A malicious campaign has been discovered using Google Ads to distribute a trojanized CPU-Z tool, which delivers Redline info-stealing malware.

Malwarebytes analysts linked this malvertising operation to a previous one involving a fake Notepad++ update.

The ad directs users to a convincing clone of WindowsReport, a legitimate Windows news site, which hosts the harmful download.

The trojanized CPU-Z installer is signed with a valid certificate, reducing the likelihood of detection by security software.

Victims who download and execute the file encounter the 'FakeBat' malware loader, which then retrieves and executes the Redline Stealer on the computer.

Redline Stealer can collect a wide array of personal information from the victim’s machine, including passwords, cookies, and cryptocurrency wallet data.

Users are advised to be cautious when clicking on promoted search results and to verify website authenticity or to use ad-blockers to prevent exposure to such threats.