labs.guard.io
Open in
urlscan Pro
162.159.153.4
Public Scan
Submitted URL: https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516...
Effective URL: https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516...
Submission: On December 30 via api from IN — Scanned from DE
Effective URL: https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516...
Submission: On December 30 via api from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Open in app Sign up Sign in Write Sign up Sign in “DECEPTIONADS” — FAKE CAPTCHA DRIVING INFOSTEALER INFECTIONS AND A GLIMPSE TO THE DARK SIDE OF INTERNET ADVERTISING Guardio · Follow 17 min read · Dec 16, 2024 152 5 Listen Share By Nati Tal (Head of Guardio Labs) > Guardio Labs tracked and analyzed a large-scale fake captcha campaign > distributing a disastrous Lumma info-stealer malware that circumvents general > security measures like Safe Browsing. Entirely reliant on a single ad network > for propagation, this campaign showcases the core mechanisms of malvertising — > delivering over 1 million daily “ad impressions” and causing thousands of > daily victims to lose their accounts and money through a network of 3,000+ > content sites funneling traffic. Our research dissects this campaign and > provides insights into the malvertising industry’s infrastructure, tactics, > and key players. > > Through a detailed analysis of redirect chains, obfuscated scripts, and > Traffic Distribution Systems (TDS) — in collaboration with our friends at > Infoblox — we traced the campaign’s origins to Monetag, a part of > ProepllerAds’ network previously tracked by Infoblox under the name “Vane > Viper.” Further investigation reveals how threat actors leveraged services > like BeMob ad-tracking to cloak their malicious intent, showcasing the > fragmented accountability in the ad ecosystem. This lack of oversight leaves > internet users vulnerable and enables malvertising campaigns to flourish at > scale. THE FAKE-CAPTCHA LUMMA STEALER CAMPAIGN For several weeks, a large-scale deceptive campaign has leveraged a cunning technique: tricking users into installing dangerous stealer malware via a captcha verification page. This seemingly legitimate captcha page appears unexpectedly as you browse a content site, perfectly mimicking a real verification process. It asks you to confirm you’re human through a series of keyboard clicks, which ultimately trigger the Run dialog on your Windows system. Unknowingly, you paste and execute a cleverly crafted PowerShell command, instantly installing stealer malware that targets your social accounts, banking credentials, passwords, and personal files. Vicious, effective, and dangerously evasive! Despite recent news coverage, the question remains: How does a fake captcha suddenly appear, tricking unsuspecting users into executing a malicious PowerShell command under the guise of verifying their human identity? What keeps this campaign not only active but thriving? The fake captcha flow — forcing site visitors to unknowingly execute a PowerShell command What are we overlooking? It’s not solely the clever disguise of captcha imitation that marks the success of this campaign. The real concern lies in how this perilous page makes its way onto our screens. The answer is malvertising — malvertising on steroids. This initial deceit is just the surface; the ad network underlying mechanics reveal a darker, more complex web of digital threats. AD-NETWORKS AS ENABLERS Since the early days of the internet, advertising has been a cornerstone, growing increasingly vital over the years. For instance, in 2023, almost 70% of Google’s revenue stems from advertisements, highlighting the lucrative nature of this industry. However, the ad tech industry has also taken a darker turn, becoming a prominent channel for malicious activities. Examples abound, from fake e-commerce sites advertised on Facebook to deceptive “Download” buttons that deliver unexpected software and even rogue sponsored results in Google. The responsibility often falls on Ad Networks. These services form the link between advertisers seeking to sell products or services and website publishers looking to monetize available space. Ad networks handle the coding, analytics, and management necessary for both parties. The Ad-Network ecosystem — Publishers monetizing on ad zones and Advertisers seeking impressions The process is straightforward: website owners register with an ad network, receive code snippets to integrate into their sites, creating “Advertisement Zones.” These zones, when activated, direct traffic to the network’s Traffic Distribution System (TDS), which houses numerous domains and redirectors. The system then selects the most optimized advertisement to display based on visitor analysis, campaign budgets, and settings — all in milliseconds. The advertisers focus on optimizing landing pages for conversion, while website owners collect their earnings. EVOLVING FROM ADVERTISING TO MALVERTISING CAPTCHAS Ad networks have proven exceptionally successful; they are fine-tuned machines built from the ground up to distribute traffic on a massive scale, from advertisers to internet users across a vast ecosystem of websites. But what happens when advertisers are replaced with threat actors? Yea, you’re right—we get Malvertising. Many active ad networks are raising alarms with the content they distribute today. Although they don’t have sole control or responsibility for this content, the overtly malicious intent and scale of the activities exploiting their networks are too significant to ignore or absolve them of all responsibility. A visitor activating an ad-placement process and the ad network selecting the target creative (good or bad) The scenario above is a real-life example of how just three simple clicks on an ostensibly benign website can lead you down an unexpected path—perhaps when you only want to watch a movie. But will you actually get to see that movie? Unfortunately, that’s far from guaranteed… FAKE-CAPTCHA’S MALVERTISING: END-2-END ANALYSIS This Fake Captcha campaign might be the holy grail study case of how ad networks fuel the mass distribution of today’s malicious activity. Analysis shows that all the traffic directed to fake captcha pages came from ad clicks—thus, this entire campaign is based on malvertising! But who is behind this ad network abuse? Upon examining the ad-related scripts embedded on these sites, it became clear that they originate from a single ad network service. These scripts lead to thousands of domains with odd names but share common parameters. Through a detailed examination of DNS fingerprints, server IPs, and locations, we linked these domains to “Omnatuor/Vane Viper” — a threat actor previously discovered and since tracked by our friends at Infoblox. Notably, this isn’t the first instance of this ad network being associated with the distribution of malicious content. Surprised? Example of a full fake captcha malvertising attack flow including all services in use In collaboration with Infoblox and through meticulous deobfuscation of JavaScript snippets responsible for triggering ad events, we identified the ad network service responsible—Monetag. Monetag is a subsidiary of PropellerAds, a large ad network company based in Cyprus. As with Infoblox’s analysis, PropellerAds activity had already come up on the radar of the cyber security community in the past. Another crucial clue further in the flow is a redirect chain from a Monetag TDS domain to another unique URL pattern. This is yet another TDS from a specific service called BeMob, an advertisment tracking service, as we realized quite quickly from the DNS’s A-Records pattern (xxxx.bmtrck.com) that is shared to all those domains: Revealing the TDS behind the fake captcha cloaking mechanism via DNS records Ad tracking, like BeMob provides, is quite a common service for ad campaigns. Although we can think the threat actor would like to track and optimize their “advertisement” campaign via a service like this — this is not the case here. It is used solely for cloaking. By supplying a benign BeMob URL to Monetag’s ad management system instead of the direct fake captcha page, the attackers leveraged BeMob’s reputation, complicating Monetag's content moderation efforts. We’ve seen this practice many times in the past and in various variants, just like MasquerAd-ing on Google. Cloaking in action — Moderator sees a benign creative seemingly changed to malicious upon activation This BeMob TDS finally redirects to the malicious captcha page, hosted on services like Oracle Cloud, Scaleway, Bunny CDN, EXOScale, and even Cloudflare’s R2 itself! What would Alanis Morissette say about that?! A Cloudflare-themed fake captcha page hosted on… Cloudflare R2 storage! The ability to propagate in scale using an ad network and cloaking their intent using yet another ad service allows this campaign to gain traction and keep on going. Moreover, the malicious pages are frequently updated with new variants to evade detection. Those use different PowerShell one-liners, different script obfuscation to copy the PowerShell script to the clipboard, as well as changes in visual design: The JS snippet on fake captcha page copying the malicious PowerShell one-liner to clipboard Another JS snippet variant introduced later on, trying (unsuccessfully) to hide its real intent The numbers are quite astonishing. Over just the past ten days, our analysis estimated up to 1M “ad impressions” per day, arriving from around 3000+ publisher sites. Some use the popup script that creates new tabs on any click, and some are designed from the ground up to redirect users to “direct links” — a special URL provided by Monetag to trigger an ad event. > As we delve deeper into the distribution method known as malvertising, it > becomes clear how intricate and complicated the fake captcha campaign truly > is. Yet, the core operations heavily rely on the ad network — essentially, > their standard business practice is transformed for malicious use. This investigation sets the stage for a deeper exploration of the ad network’s ecosystem. How have they cultivated such a robust, active network of publishers in the first place? Let’s start with analyzing what stands behind the scenes of this distribution ecosystem… THE AD-NETWORK: MONETAG First, let’s delve into Monetag's operations. Becoming a publisher on this platform is straightforward: a site owner sets up an account and, within minutes, creates various “Advertising Zones.” These zones range from simple banners to intrusive pop-ups that open new tabs on any user click, notifications that persistently push ads, or a “Multi-Tag” that automates all these annoyances at once: Monetag — adding a script tag or all types from popup tabs, banners, push notifications, and a multi-tag A simple on-click triggered advertisement placement JS tag placement Despite their simplicity and ease of integration, these JavaScript tags are just the tip of the iceberg. Once loaded, they fetch and execute heavily obfuscated scripts directly from Monetag’s Traffic Distribution System (TDS). These scripts perform extensive fingerprinting of the site visitor’s browser and system, inject tracking cookies, and even scan the website content for other networks and tracking scripts. These ad scripts essentially “hijack” the site, capturing clicks to spawn new ad tabs, soliciting notification permissions, and even deploying pop-over iframes. To ensure uninterrupted operation, Monetag cleverly circumvents ad-blockers via special obfuscated scripts offered to publishers — for extra monetization! Extra-Monetization in the form of a complex obfuscated tag that evades ad-blockers On the other hand, advertisers on the platform manage their accounts by setting up creatives and targeting rules based on their advertising budget. Monetag’s system then determines which ads are shown to which visitors, a process common across all major ad networks, including giants like Facebook and Google. Imagine the potential for misuse: an advertiser could leverage this powerful, customizable TDS to precisely target an audience for a campaign — say, a Windows PowerShell-based infostealer. Rather than indiscriminately spreading malware and risking quick detection by security protocols, why not specifically target real users not behind a virtual machine or sandbox (to skip us, researchers…)? Or select users with high-end profiles as identified by the intrusive fingerprinting scripts, and of course, those running the specific Windows OS versions vulnerable to the infostealer? THE PUBLISHERS: PIRATED CONTENT AND CLICK-BAITS An ad network is only as effective as its funnel of users. With Monetag’s vast catalog of publishers, the “infection chain” begins with a plethora of websites. Yet, most of them share some characteristics that raise questions about their nature and origin. In our analysis, we identified approximately 3,000 publisher sites actively using Monetag ad-zone scripts in the last ten days. These scripts track visitors and trigger intrusive actions such as push notifications and new tab pop-ups. For instance, the anime site “hianime[.]to” alone garnered over 100k+ unique visits last month. Looking at the overall list shows interesting classifications that can teach us a lot about this activity: Monetag’s Publisher sites in the past 10 days by categories perc. of total combined traffic Visitors seeking anything from streaming videos to downloading academic documents inadvertently land on these sites. A simple search like “stream anime” can lead directly to these cloned sites, prominently positioned in Google search results due to aggressive SEO (Search Engine Optimization): A real example of powerful SEO - First Google Search results pointing to a Monetag-enabled site But the machinations don’t stop there. Monetag also promotes the use of direct links, which circumvent the need for a website entirely. Imagine the myriad ways to deploy these links: social media posts, instant messages, deceptive website buttons, or even ad-ware attacks that forcibly open browser windows on your system without your acceptance. Social click-baits on Facebook and X pointing to Monetag’s direct links VirusTotal: Monetag’s TDS domains direct link to Android/Desktop adware as well as Propeller-Ads infra So, who operates these sites? Are they legitimate businesses or mere facades for illicit earnings? While no definitive evidence proves the latter, the uniformity across many sites suggests a coordinated effort. Many websites, appearing unique at first glance, share identical content and layouts, either translated or slightly tweaked: Copy-Paste Content Site Kits for Streaming Public repositories on GitHub even offer ready-to-deploy website templates that require only the insertion of ad script codes: Example of a repo providing several streaming site kits with ready-to-go Monetag integrations There are so many streaming websites offering the latest movies — some of which have not even been released yet! And all this clickbaity content is offered to you free of charge. If you want to get even more conspiratorial, you can argue that this entire ecosystem of publisher sites is fueled by the ad network itself, providing site templates, SEO optimizations, and maybe even the content itself, like pirated movies and live sports game streams. We are not saying this is the case, but one should judge for themselves: Look at this “service” offering a ready-to-use video player loaded with unlimited movies that integrate seamlessly into any site. Under the hood, this video player iframe uses Monetag ad scripts to monetize this traffic directly from the ad network: Online service providing unlimited video libraries in an iframe —with integral Monetag monetization This service’s ubiquity across multiple web pages (and site templates ready to deploy as mentioned above) suggests a systematic strategy to amplify traffic and, consequently, ad revenue. Double the fun — both video service as well as the content site monetize on Monetag Ha, and what about sites that never intended to monetize their content, not to say, to infect their visitors with stealers? A branch of the publishers’ ecosystem is just compromising WordPress sites (and others, of course) to inject their Monetag scripts directly in there. Talking about passing the buck…. Reflecting on the broader scope, the scale of potential manipulation and malvertising becomes even more daunting if we consider all other active ad networks combined. The statistics are so against us — if you look for content, you will probably land on a shady ad network-enabled website quite instantly… A MIND GAME OF PLAUSIBLE DENIABILITY In such campaigns, responsibility is fragmented among numerous parties — each playing a role yet avoiding full accountability. From the threat actor (the ad network customer) to everyday internet users (the victims), a single ad click sets off a chain reaction involving multiple service providers, domains, servers, and stakeholders — all within milliseconds: The chain of responsibility — how a malvertising campaign abuses the entire ads eco-system So, who is to blame? Who is turning a blind eye, acting irresponsibly, or perhaps even complicit? The reality is that responsibility is widely shared, but each player in this ecosystem has a convenient excuse: * The Ad Network claims it cannot moderate the creative content because it’s cloaked behind an ad statistics service. Yet, moderation post-approval, not just during initial configuration, is entirely possible. * The Ad Tracking Service argues it’s merely an analytics tool, leaving the advertiser and ad network responsible for the creative. With cloaking techniques, the advertiser can swap the creative after approval, avoiding detection. * The Publishers insist they’re simply monetizing their websites via third-party services like ad networks, distancing themselves from the malicious creatives delivered to their visitors. * The Hosting Services that provide the infrastructure for these malicious pages largely claim ignorance. But are they also part of the willful negligence that perpetuates this ecosystem? > This fragmented chain of ownership creates a perfect storm of plausible > deniability, making it exceptionally difficult to pinpoint and enforce > accountability. It’s a system designed to shift blame while allowing malicious > campaigns to thrive. RESPONSIBLE DISCLOSURE We reached out to Monetag and BeMob, disclosing all IOCs associated with their TDSs, and both acted to stop the campaign’s propagation. Monetag, the primary propagation channel abused for this campaign, responded on November 28th, 2024, removing over 200 accounts linked to the threat actor. While this action effectively halted the campaign on their platform, it took eight days from our initial disclosure to implementation. Similarly, BeMob responded within four days, removing accounts used for cloaking. These swift actions highlight how quickly a major malvertising campaign can be dismantled when taken seriously. Approx. Fake Captcha page views in the past 2 weeks: Disclosure Milestones We appreciate Monetag and BeMob’s prompt responses and willingness to act decisively. However, this campaign underscores the need for stronger proactive measures. Ad networks must prioritize ongoing content moderation, robust account validation to prevent fake registrations, and more accessible reporting mechanisms for the cybersecurity community. Waiting for external reports to address such abuses is not enough. These systems require continuous oversight to protect not just their clients but all internet users. Monetag shared valuable insights about the threat actor’s abuse of their network, including the use of falsified documents and hundreds of fraudulent accounts. Their official response is included below: > “At Monetag, we take the security of our network, publishers, and users > extremely seriously. Upon identifying malicious activities, we acted swiftly > to ban over 200 accounts linked to the abuse. We remain committed to > strengthening our defenses, working collaboratively with researchers like > Guardio, and refining our processes to minimize abuse on our platform. The > safety and integrity of our ecosystem are paramount, and we will continue > investing in measures to mitigate threats effectively.” (Monetag) Lastly, if you noticed something curious in the activity graph above - you’re not mistaken. The campaign may have paused for a few days, but its value to the threat actors proved too enticing to abandon. They’re back — this time leveraging both Monetag once again as well as other ad networks. Rest assured, we’ll continue monitoring and addressing this evolving threat: Approx. Fake Captcha page views in the past 2 weeks: downtime and resurrection FINAL THOUGHTS From deceptive publisher sites offering pirated or clickbait content to complex redirect chains and cloaking techniques, this campaign underscores how ad networks, designed for legitimate purposes, can be weaponized for malicious activities. The result is a fragmented chain of responsibilities, with ad networks, publishers, ad statistics services, and hosting providers each playing a role yet often avoiding accountability. This fake captcha campaign is just one example that exposes the darker side of the internet’s advertising ecosystem. While advertising is a cornerstone of the modern internet, the same ecosystem now faces a significant conflict of interest — creating a security gap that leaves users vulnerable. At Guardio, we continuously reveal, track, and analyze attack vectors exploiting foundational internet traffic systems, with ad networks being a prominent example. The takeaway is simple: be cautious of websites offering FREE content you would otherwise pay for. As we always say — there’s no such thing as a free gift on the internet. IOCS Fake Captcha Pages: ajmaboxanherulv1.b-cdn[.]net/JSKADull.html ajmaboxanherulv2.b-cdn[.]net/JSKADull.html anti-automation-v2.b-cdn[.]net/verf-v2.html anti-automation-v3.b-cdn[.]net/verf-v3.html anti-automation-v4.b-cdn[.]net/verf-v3.html anti-automation-v5.b-cdn[.]net/verf-v5.html anti-automation-v6.b-cdn[.]net/Recap-v6.html arcivevaxue34.b-cdn[.]net bmy7etxgksxo.objectstorage.ca-toronto-1.oci.customer-oci[.]com/n/bmy7etxgksxo/b/... bmy7etxgksxo.objectstorage.sa-santiago-1.oci.customer-oci[.]com/n/bmy7etxgksxo/b/ bot-check-v1.b-cdn[.]net bot-check-v2.b-cdn[.]net bot-systemexplorer.b-cdn[.]net/recaptcha-v4-protocol-nov23.html botcheck-encrypted-system.b-cdn[.]net/recaptcha-verification.html check-cf-ver1.b-cdn[.]net/version3/cf-check.html check-in-cf.b-cdn[.]net/verify/cf-check.html dedicloadpgeing.b-cdn[.]net/dedicated-captcha-page.html dedicloadpgeingv10.b-cdn[.]net/dedicated-captcha-page.html dedicloadpgeingv11.b-cdn[.]net/dedicated-captcha-page.html dedicloadpgeingv12.b-cdn[.]net/final-step-to-continue.html dedicloadpgeingv2.b-cdn[.]net/dedicated-captcha-page.html dedicloadpgeingv4.b-cdn[.]net/dedicated-captcha-page.html dedicloadpgeingv5.b-cdn[.]net/dedicated-captcha-page.html dedicloadpgeingv6.b-cdn[.]net/dedicated-captcha-page.html dedicloadpgeingv7.b-cdn[.]net/dedicated-captcha-page.html dedicloadpgeingv8.b-cdn[.]net/dedicated-captcha-page.html dedicloadpgeingv9.b-cdn[.]net/dedicated-captcha-page.html encryption-code-verification.b-cdn[.]net/recaptcha-verification.html encryption-code-verification.b-cdn[.]net/verify-human-recaptcha.html encryption-module-botverify.b-cdn[.]net/recaptcha-verification.html file-typ-botcheck-v1.b-cdn[.]net/prove-human-recaptcha.html file-typ-botcheck.b-cdn[.]net/prove-human-recaptcha.html full-fast-movie-downloader.b-cdn[.]net/KH6kjsdNVk4sUIEW4klsw43ep8piJHOl.html itechtics[.]com/hide-show-taskbar izmncdnboxuse01.b-cdn[.]net/final-step-to-continue.html izmncdnboxuse02.b-cdn[.]net/final-step-to-continue.html izmncdnboxuse03.b-cdn[.]net/final-step-to-continue.html izmncdnboxuse04.b-cdn[.]net/final-step-to-continue.html izmncdnboxuse05.b-cdn[.]net/final-step-to-continue.html izmncdnboxuse06.b-cdn[.]net/final-step-to-continue.html izmncdnboxuse07.b-cdn[.]net/final-step-to-continue.html newverifyyourself-system.b-cdn[.]net/recaptcha_verification-v1.html newverifyyourself-system1.b-cdn[.]net/recaptcha_verification-new.html nikutjyjgchr.b-cdn[.]net/RYFTGJcaptchv1.html nikutjyjgchr.b-cdn[.]net/SYNCfuzzv2.html nikutjyjgchrv21.b-cdn[.]net/SYNCfuzzv2.html nikutjyjgchrv22.b-cdn[.]net/SYNCfuzzv2.html nikutjyjgchrv23.b-cdn[.]net/SYNCfuzzv2.html nikutjyjgchrv24.b-cdn[.]net/SYNCfuzzv2.html nikutjyjgchrv25.b-cdn[.]net/SYNCfuzzv2.html objectstorage.ap-mumbai-1.oraclecloud[.]com/n/bmy7etxgksxo/b/bucket-aws-vip/o/ objectstorage.ap-mumbai-1.oraclecloud[.]com/n/bmy7etxgksxo/b/buket-aws/o/ objectstorage.ap-mumbai-1.oraclecloud[.]com/n/bmy7etxgksxo/b/fetchbucket/o/ objectstorage.ap-mumbai-1.oraclecloud[.]com/n/bmy7etxgksxo/b/lusbucket/o/ objectstorage.sa-santiago-1.oraclecloud[.]com/n/bmy7etxgksxo/b/to-continue/o/ precious-valkyrie-cea580[.]netlify.app/recaptcha-sep-v2-1-baba.html pub-7a0525921ff54f1193db83d7303c6ee8.r2[.]dev/verify-me-first-v1.html sos-at-vie-1.exo[.]io/bucketrack/dir62/final/ sos-at-vie-1.exo[.]io/cloudcask/ sos-at-vie-2.exo[.]io/sanbuck/ sos-bg-sof-1.exo[.]io/amdbuck/ sos-bg-sof-1.exo[.]io/asgbuck/verify/hcaptcha-human-check.html sos-ch-dk-2.exo[.]io/ataniya/bigot/ sos-ch-dk-2.exo[.]io/bucketofbits/modi-cloudflare-update-new.html sos-ch-dk-2.exo[.]io/filebyte/ sos-ch-gva-2.exo[.]io/bytebin/ sos-ch-gva-2.exo[.]io/clouddesk/ sos-ch-gva-2.sos-cdn[.]net/bytebin/ sos-de-fra-1.exo[.]io/sandisk/step/ sys-update-botcheck.b-cdn[.]net/get-this-puzzle-solved.html system-update-botcheck.b-cdn[.]net/security-challenge-captcha.html upgraded-botcheck-encryption.b-cdn[.]net/verify-human-recaptcha.html verification-module-v2.b-cdn[.]net/recaptcha_verification_updated.html verification-module-v3.b-cdn[.]net/recaptcha_verification_updated.html verification-module-v4.b-cdn[.]net/recaptcha_verification_updated.html verification-module-v5.b-cdn[.]net/recaptcha_verification_updated.html verification-module-v6.b-cdn[.]net/recaptcha_verification_updated.html verification-module-v7.b-cdn[.]net/recaptcha_verification_updated.html verification-module-v8.b-cdn[.]net/recaptcha_verification_updated.html verification-module-v9.b-cdn[.]net/recaptcha_verification_updated.html verifyyourself-newsystem.b-cdn[.]net/recaptcha_verification.html verifyyourself-system.b-cdn[.]net/recaptcha_verification-new.html weoidnet01.b-cdn[.]net/IQWJDolx.html weoidnet010.b-cdn[.]net/IQWJDolx.html weoidnet011.b-cdn[.]net/IQWJDolx.html weoidnet012.b-cdn[.]net/IQWJDolx.html weoidnet013.b-cdn[.]net/IQWJDolx.html weoidnet015.b-cdn[.]net/IQWJDolx.html weoidnet02.b-cdn[.]net/IQWJDolx.html weoidnet03.b-cdn[.]net/IQWJDolx.html weoidnet04.b-cdn[.]net/IQWJDolx.html weoidnet05.b-cdn[.]net/IQWJDolx.html weoidnet06.b-cdn[.]net/IQWJDolx.html weoidnet07.b-cdn[.]net/IQWJDolx.html weoidnet08.b-cdn[.]net/IQWJDolx.html weoidnet09.b-cdn[.]net/IQWJDolx.html ytgvjh65archi.b-cdn[.]net/ cloud-checked[.]com/cf/verify/{dddddd}/check fiare-activity[.]com/cf/verify/{dddddd}/check chromeupdates[.]com marimarbahamas[.]me/downloads/index.html cdn-downloads-now[.]xyz fingerboarding[.]com/cha restoindia[.]me/recaptcha/downloads travelwithandrew[.]xyz/assets/index.html foodrailway[.]cfd/tracker/index.php BeMob campaign URLs used for Cloaking: https://addonclicks[.]com/go/aa22d074-412b-41b9-ba13-7dcf967019d9 https://addonclicks[.]com/go/b37e8c6f-ddee-4501-8a45-c5a466afee72 https://adstrails[.]com/go/3a2f0420-aa82-403a-a04e-4df13708bc04 https://adstrails[.]com/go/708fba2f-fbc0-45d0-831f-4e92054b1b73 https://adstrails[.]com/go/ac3d7719-d344-478a-b3b6-06bf5461f189 https://boltsreach[.]com/go/83afb110-50f2-4b29-a93e-15e37801c7e2 https://camplytic[.]com/go/7110a328-a727-4c2c-9e88-3a71adf76cb1 https://clickzstreamer[.]com/go/7110a328-a727-4c2c-9e88-3a71adf76cb1 https://clickzstreamer[.]com/go/cdff9f96-8cbd-4c44-b679-2f612a64cd00 https://clovixo[.]com/go/35b66391-3541-4d40-a116-52515cc39b9e https://editorcoms[.]com/go/49b491b8-09d0-422d-8735-275dc82a37ca https://editorcoms[.]com/go/dd423e06-1ace-4a1f-80be-1790bdbbe75d https://fineclouding[.]com/go/0160ee85-0b3d-45cf-adbd-4801966ce1dd https://fineclouding[.]com/go/134f0807-4dc8-4a61-895c-acf5107b611a https://fineclouding[.]com/go/7ffe1a51-dc79-4e3f-ac7e-ab76c4741738 https://fineclouding[.]com/go/83a7f27f-d3ae-4935-b854-fdf492984ed3 https://fineclouding[.]com/go/e331e010-c671-4ea5-83c7-7518b2f08b7b https://freeofapps[.]com/go/9f900112-9d2f-41f7-a8db-cd21dd738750 https://gamebalri[.]com/go/6818d61d-1f2e-4bc0-a98b-c63669acc41f https://gawanjaneto[.]com/go/180f58b8-38df-46cb-a0d2-d6f12d8aa8a8 https://gawanjaneto[.]com/go/7b4c672a-7787-45cc-913b-1f2f9108d002 https://getcodavbiz[.]com/go/ce1c3e68-e155-4e87-992c-b66f1485aef9 https://glidronix[.]com/go/8eb5d9be-98ca-42c4-8185-090a299eb3ef https://godagichi[.]com/go/10a84a68-b524-4885-adb2-bfbda4c17778 https://helpmemoverand[.]com/go/26131470-304e-4f6c-b6dc-1ffd5c5a9930 https://helpmemoverand[.]com/go/a895c485-d572-4e80-bd52-9dd3540c81d9 https://helpmemoverand[.]com/go/dc3ae9c2-de16-4dc0-b614-b0b36b81f319 https://impressflow[.]com/go/f7d8c7fb-c416-4972-94cd-2f1ede1bac38 https://insigelo[.]com/go/0e94e3bf-65a0-476a-b00e-5ababc6ff856 https://insigelo[.]com/go/96f84023-dd9d-4331-9788-5705babb7f0c https://insigelo[.]com/go/fecdc64b-280d-4ee1-9f28-96efb38acb15 https://latestgadet[.]com/go/837d85a4-fda0-4b10-89c8-c840455acb25 https://linkspans[.]com/go/7110a328-a727-4c2c-9e88-3a71adf76cb1 https://mediamanagerverif[.]com/go/2bf025b9-52c0-4587-bf7f-9a8cdd459851 https://mediamanagerverif[.]com/go/9626641b-871b-45e1-b360-84e2767326cc https://mediamanagerverif[.]com/go/d3aa1081-e2fd-4bc5-b168-5502eae928f1 https://mytecbiz.org/go/a8b87aed-1575-4d89-b503-974f4e932152 https://nettrilo[.]com/go/4c5443a1-ba90-487a-839a-b67a2b0317a8 https://nettrilo[.]com/go/708fba2f-fbc0-45d0-831f-4e92054b1b73 https://nowuseemi[.]com/go/e594bfab-e401-456c-a4fc-63d70055ff5b https://offerzforu[.]com/go/7a343cf8-3eb1-4b24-9534-948f237f0941 https://offerztodayforu[.]com/go/61eba7aa-81b9-4836-9636-76b263f6f8cd https://privatemeld[.]com/go/014e411a-91a4-44b3-9da2-5954404438dc https://privatox[.]com/go/a391ee5e-c1f4-4654-90a8-f545126dc3a7 https://provenhandshakecap[.]com/go/3442df81-6329-4d47-8594-73a9455c5363 https://provenhandshakecap[.]com/go/c33549db-0cfb-4805-a3f6-64213cd4c3a9 https://provenhandshakecap[.]com/go/d2ce67cc-16c8-4a3a-938e-c3389b412786 https://purnimaali[.]com/go/b36d4019-1072-445e-8719-8fae7640ed7f https://reachorax[.]com/go/2f3b2ad6-8c07-4095-ad09-89abc67a495d https://regsigara[.]com/go/a78798ba-50d8-4cef-9a64-1bd0e917da8e https://satisfiedweb[.]com/go/3710d145-158f-4faa-942f-467142fd9201 https://scrutinycheck.cash/go/180f58b8-38df-46cb-a0d2-d6f12d8aa8a8 https://scrutinycheck.cash/go/f94e2fd6-3569-4d2d-b596-5e07f79a5818 https://searchmegood[.]com/go/49c2dac8-63b7-46d9-a9f6-6ebdaa1ce3ee https://searchmegood[.]com/go/897a19a7-2e55-408c-94a6-d82617b5361f https://secureporter[.]com/go/c788f30c-9d6f-4fdd-96bc-1767e250f9c5 https://servinglane[.]com/go/83864c8d-2168-4d4e-bf47-b67a99e6178a https://sheenglathora[.]com/go/3442df81-6329-4d47-8594-73a9455c5363 https://smartlinkoffer[.]com/go/15ef9db0-585b-4c85-9ffc-a2b6e81c4bfa https://smartlinkoffer[.]com/go/6754805d-41c5-46b7-929f-6655b02fce2c https://smartlinkoffer[.]com/go/b11f973d-01d4-4a5b-8af3-139daaa5443f https://spotconningo[.]com/go/3119e6d0-9df0-4116-816f-0ff62631557b https://startingdestine[.]com/go/ad3b65a2-9255-4017-a1e1-087bcca4e2ef https://stephighs[.]com/go/34073388-1d3a-4671-804e-036143ad82e5 https://stephighs[.]com/go/4be1a5d1-14ab-44ae-bea7-d55de09afac0 https://stephighs[.]com/go/a8e78df0-c0cb-4d55-b4e9-48ed33fd2a6e https://stephighs[.]com/go/ce1c3e68-e155-4e87-992c-b66f1485aef9 https://streamingsplays[.]com/go/1c406539-b787-4493-a61b-f4ea31ffbd56 https://streamingsplays[.]com/go/6754805d-41c5-46b7-929f-6655b02fce2c https://streamingsplays[.]com/go/b11f973d-01d4-4a5b-8af3-139daaa5443f https://streamingszone[.]com/go/b3ddd860-89c0-448c-937d-acf02f7a766f https://tagsflare[.]com/go/0c3c343a-abfa-4467-b52d-0c20711b2d7e https://taketheright[.]com/go/ee8430f6-c0db-4d47-95db-3fdcf5941225 https://techstalone[.]com/go/2bf025b9-52c0-4587-bf7f-9a8cdd459851 https://techstalone[.]com/go/9626641b-871b-45e1-b360-84e2767326cc https://techstalone[.]com/go/d3aa1081-e2fd-4bc5-b168-5502eae928f1 https://tracksvista[.]com/go/b67f38ca-952b-44e3-b463-126a325e85c6 https://trailsift[.]com/go/5c881316-6dd0-46cb-b9aa-2d72b614d026 https://tunneloid[.]com/go/520c3874-eeb8-4f5c-bc79-849759f17715 https://vanshitref[.]com/go/e594bfab-e401-456c-a4fc-63d70055ff5b https://verticbuzz[.]com/go/ca526b93-0797-4fd6-b107-fdf823a5badb https://westreamdaily[.]com/go/2912600c-ec64-47fd-93cd-d7172bc29206 https://yourtruelover[.]com/go/76c79b3b-c3bd-409a-9f9d-d25f984b6ac5 https://yourtruelover[.]com/go/d05741b5-5782-4882-b0d0-d5cbf5c14f58 50 Most Active Publisher Domains Monetizing via Monetag: hianime[.]to 9animetv[.]to aniwatchtv[.]to sflix[.]to myflixerz[.]to hdtodayz[.]to 9minecraft[.]net chapmanganato[.]to y2mate[.]com steamrip[.]com y2meta[.]tube tubemp4[.]is moviesjoy[.]is gomovies[.]sx asuracomic[.]net freek[.]to flixhq[.]to mangakakalot[.]com coinpriceline[.]com hurawatch[.]cc movies2watch[.]tv theflixertv[.]to mangafire[.]to z-lib[.]io hydrahd[.]cc cinego[.]tv ouo[.]io filecrypt[.]co vipbox[.]lc totalsportek[.]best dopebox[.]to sportshub[.]stream manhwaclan[.]com streameast[.]best mangareader[.]to kaido[.]to megadb[.]net mangabuddy[.]com kisskh[.]co bato[.]to mangaread[.]org manhuaus[.]com gostream[.]to alphatron[.]tv readcomiconline[.]li dramacool[.]bg mixdrop[.]ps e123movieswatch[.]com totalsportek[.]games aniwatch[.]to travelmiso[.]com SIGN UP TO DISCOVER HUMAN STORIES THAT DEEPEN YOUR UNDERSTANDING OF THE WORLD. FREE Distraction-free reading. No ads. Organize your knowledge with lists and highlights. Tell your story. Find your audience. Sign up for free MEMBERSHIP Read member-only stories Support writers you read most Earn money for your writing Listen to audio narrations Read offline with the Medium app Try for 5 $/month Malvertising Phishing Cybersecurity Safe Browsing Stealer Malware 152 152 5 Follow WRITTEN BY GUARDIO 871 Followers ·2 Following Keeping your online identity and information secure on every corner of the web. #SafeBrowsing Learn more at https://guard.io Follow RESPONSES (5) What are your thoughts? Cancel Respond Respond Also publish to my profile Nailaabdulrehman 13 days ago , instant messages, deceptive website buttons, or even ad-ware attacks that forcibly open browser windows on your system without your acceptance. Great 18 Reply Theo Tao 12 days ago Woaw Reply Manan Bukhari 12 days ago Good Reply See all responses MORE FROM GUARDIO Guardio “ECHOSPOOFING” — A MASSIVE PHISHING CAMPAIGN EXPLOITING PROOFPOINT’S EMAIL PROTECTION TO DISPATCH… BY NATI TAL (HEAD OF GUARDIO LABS) Jul 29 128 Guardio “SCAMMERS PARADISE” —EXPLORING TELEGRAM’S DARK MARKETS, BREEDING GROUND FOR MODERN PHISHING… BY OLEG ZAYTSEV, NATI TAL (GUARDIO LABS) Jan 29 95 Guardio “PHISHFORCE” — VULNERABILITY UNCOVERED IN SALESFORCE’S EMAIL SERVICES EXPLOITED FOR PHISHING… BY OLEG ZAYTSEV, NATI TAL (GUARDIO LABS) Aug 2, 2023 107 4 Guardio “ETHERHIDING” — HIDING WEB2 MALICIOUS CODE IN WEB3 SMART CONTRACTS BY NATI TAL, OLEG ZAYTSEV (GUARDIO LABS) Oct 13, 2023 397 7 See all from Guardio RECOMMENDED FROM MEDIUM Harendra HOW I AM USING A LIFETIME 100% FREE SERVER GET A SERVER WITH 24 GB RAM + 4 CPU + 200 GB STORAGE + ALWAYS FREE Oct 26 8.3K 132 In UX Collective by Rita Kind-Envy GOODBYE, IMMORTAL DESIGN THIS IS THE END FOR BIALETTI — AN IMMORTAL DESIGN THAT OUTLIVED AND BURIED (LITERALLY) ITS OWNER. Dec 9 4.1K 75 LISTS TECH & TOOLS 22 stories·375 saves MEDIUM'S HUGE LIST OF PUBLICATIONS ACCEPTING SUBMISSIONS 377 stories·4272 saves STAFF PICKS 791 stories·1533 saves NATURAL LANGUAGE PROCESSING 1881 stories·1509 saves Rishav anand LEARN CLOUD PENTESTING (ROADMAP) AND EARN IN $100,000—$150,000 CLOUD PENETRATION TESTING (OR CLOUD PENTESTING) INVOLVES TESTING THE SECURITY OF CLOUD ENVIRONMENTS, INFRASTRUCTURE, APPLICATIONS, AND… Oct 25 256 5 In Fourth Wave by Mona Lazar IF YOU’RE PLANNING TO LEAVE TRUMP’S AMERICA, DON’T COME TO EUROPE REALITY LOOKS DIFFERENT ON THE OTHER SIDE OF THE ATLANTIC Dec 9 12K 388 Annie Trevaskis ONLY 1% OF PEOPLE CAN SEE THE HIDDEN SQUIRREL IN THIS PICTURE IN UNDER 15 SECONDS Nov 1 6.5K 183 Jessica Stillman JEFF BEZOS SAYS THE 1-HOUR RULE MAKES HIM SMARTER. NEW NEUROSCIENCE SAYS HE’S RIGHT JEFF BEZOS’S MORNING ROUTINE HAS LONG INCLUDED THE ONE-HOUR RULE. NEW NEUROSCIENCE SAYS YOURS PROBABLY SHOULD TOO. Oct 30 18.3K 478 See more recommendations Help Status About Careers Press Blog Privacy Terms Text to speech Teams To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy.