labs.guard.io Open in urlscan Pro
162.159.153.4  Public Scan

Submitted URL: https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516...
Effective URL: https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516...
Submission: On December 30 via api from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Open in app

Sign up

Sign in

Write


Sign up

Sign in




“DECEPTIONADS” — FAKE CAPTCHA DRIVING INFOSTEALER INFECTIONS AND A GLIMPSE TO
THE DARK SIDE OF INTERNET ADVERTISING

Guardio

·

Follow

17 min read
·
Dec 16, 2024

152

5

Listen

Share

By Nati Tal (Head of Guardio Labs)

> Guardio Labs tracked and analyzed a large-scale fake captcha campaign
> distributing a disastrous Lumma info-stealer malware that circumvents general
> security measures like Safe Browsing. Entirely reliant on a single ad network
> for propagation, this campaign showcases the core mechanisms of malvertising —
> delivering over 1 million daily “ad impressions” and causing thousands of
> daily victims to lose their accounts and money through a network of 3,000+
> content sites funneling traffic. Our research dissects this campaign and
> provides insights into the malvertising industry’s infrastructure, tactics,
> and key players.
> 
> Through a detailed analysis of redirect chains, obfuscated scripts, and
> Traffic Distribution Systems (TDS) — in collaboration with our friends at
> Infoblox — we traced the campaign’s origins to Monetag, a part of
> ProepllerAds’ network previously tracked by Infoblox under the name “Vane
> Viper.” Further investigation reveals how threat actors leveraged services
> like BeMob ad-tracking to cloak their malicious intent, showcasing the
> fragmented accountability in the ad ecosystem. This lack of oversight leaves
> internet users vulnerable and enables malvertising campaigns to flourish at
> scale.




THE FAKE-CAPTCHA LUMMA STEALER CAMPAIGN

For several weeks, a large-scale deceptive campaign has leveraged a cunning
technique: tricking users into installing dangerous stealer malware via a
captcha verification page. This seemingly legitimate captcha page appears
unexpectedly as you browse a content site, perfectly mimicking a real
verification process. It asks you to confirm you’re human through a series of
keyboard clicks, which ultimately trigger the Run dialog on your Windows system.
Unknowingly, you paste and execute a cleverly crafted PowerShell command,
instantly installing stealer malware that targets your social accounts, banking
credentials, passwords, and personal files. Vicious, effective, and dangerously
evasive!

Despite recent news coverage, the question remains: How does a fake captcha
suddenly appear, tricking unsuspecting users into executing a malicious
PowerShell command under the guise of verifying their human identity? What keeps
this campaign not only active but thriving?


The fake captcha flow — forcing site visitors to unknowingly execute a
PowerShell command

What are we overlooking? It’s not solely the clever disguise of captcha
imitation that marks the success of this campaign. The real concern lies in how
this perilous page makes its way onto our screens. The answer is malvertising —
malvertising on steroids. This initial deceit is just the surface; the ad
network underlying mechanics reveal a darker, more complex web of digital
threats.


AD-NETWORKS AS ENABLERS

Since the early days of the internet, advertising has been a cornerstone,
growing increasingly vital over the years. For instance, in 2023, almost 70% of
Google’s revenue stems from advertisements, highlighting the lucrative nature of
this industry.

However, the ad tech industry has also taken a darker turn, becoming a prominent
channel for malicious activities. Examples abound, from fake e-commerce sites
advertised on Facebook to deceptive “Download” buttons that deliver unexpected
software and even rogue sponsored results in Google.

The responsibility often falls on Ad Networks. These services form the link
between advertisers seeking to sell products or services and website publishers
looking to monetize available space. Ad networks handle the coding, analytics,
and management necessary for both parties.


The Ad-Network ecosystem — Publishers monetizing on ad zones and Advertisers
seeking impressions

The process is straightforward: website owners register with an ad network,
receive code snippets to integrate into their sites, creating “Advertisement
Zones.” These zones, when activated, direct traffic to the network’s Traffic
Distribution System (TDS), which houses numerous domains and redirectors. The
system then selects the most optimized advertisement to display based on visitor
analysis, campaign budgets, and settings — all in milliseconds. The advertisers
focus on optimizing landing pages for conversion, while website owners collect
their earnings.


EVOLVING FROM ADVERTISING TO MALVERTISING CAPTCHAS

Ad networks have proven exceptionally successful; they are fine-tuned machines
built from the ground up to distribute traffic on a massive scale, from
advertisers to internet users across a vast ecosystem of websites. But what
happens when advertisers are replaced with threat actors? Yea, you’re right—we
get Malvertising.

Many active ad networks are raising alarms with the content they distribute
today. Although they don’t have sole control or responsibility for this content,
the overtly malicious intent and scale of the activities exploiting their
networks are too significant to ignore or absolve them of all responsibility.


A visitor activating an ad-placement process and the ad network selecting the
target creative (good or bad)

The scenario above is a real-life example of how just three simple clicks on an
ostensibly benign website can lead you down an unexpected path—perhaps when you
only want to watch a movie. But will you actually get to see that movie?
Unfortunately, that’s far from guaranteed…


FAKE-CAPTCHA’S MALVERTISING: END-2-END ANALYSIS

This Fake Captcha campaign might be the holy grail study case of how ad networks
fuel the mass distribution of today’s malicious activity. Analysis shows that
all the traffic directed to fake captcha pages came from ad clicks—thus, this
entire campaign is based on malvertising! But who is behind this ad network
abuse?

Upon examining the ad-related scripts embedded on these sites, it became clear
that they originate from a single ad network service. These scripts lead to
thousands of domains with odd names but share common parameters. Through a
detailed examination of DNS fingerprints, server IPs, and locations, we linked
these domains to “Omnatuor/Vane Viper” — a threat actor previously discovered
and since tracked by our friends at Infoblox. Notably, this isn’t the first
instance of this ad network being associated with the distribution of malicious
content. Surprised?


Example of a full fake captcha malvertising attack flow including all services
in use

In collaboration with Infoblox and through meticulous deobfuscation of
JavaScript snippets responsible for triggering ad events, we identified the ad
network service responsible—Monetag. Monetag is a subsidiary of PropellerAds, a
large ad network company based in Cyprus. As with Infoblox’s analysis,
PropellerAds activity had already come up on the radar of the cyber security
community in the past.

Another crucial clue further in the flow is a redirect chain from a Monetag TDS
domain to another unique URL pattern. This is yet another TDS from a specific
service called BeMob, an advertisment tracking service, as we realized quite
quickly from the DNS’s A-Records pattern (xxxx.bmtrck.com) that is shared to all
those domains:


Revealing the TDS behind the fake captcha cloaking mechanism via DNS records

Ad tracking, like BeMob provides, is quite a common service for ad campaigns.
Although we can think the threat actor would like to track and optimize their
“advertisement” campaign via a service like this — this is not the case here. It
is used solely for cloaking. By supplying a benign BeMob URL to Monetag’s ad
management system instead of the direct fake captcha page, the attackers
leveraged BeMob’s reputation, complicating Monetag's content moderation efforts.
We’ve seen this practice many times in the past and in various variants, just
like MasquerAd-ing on Google.


Cloaking in action — Moderator sees a benign creative seemingly changed to
malicious upon activation

This BeMob TDS finally redirects to the malicious captcha page, hosted on
services like Oracle Cloud, Scaleway, Bunny CDN, EXOScale, and even Cloudflare’s
R2 itself! What would Alanis Morissette say about that?!


A Cloudflare-themed fake captcha page hosted on… Cloudflare R2 storage!

The ability to propagate in scale using an ad network and cloaking their intent
using yet another ad service allows this campaign to gain traction and keep on
going. Moreover, the malicious pages are frequently updated with new variants to
evade detection. Those use different PowerShell one-liners, different script
obfuscation to copy the PowerShell script to the clipboard, as well as changes
in visual design:


The JS snippet on fake captcha page copying the malicious PowerShell one-liner
to clipboard

Another JS snippet variant introduced later on, trying (unsuccessfully) to hide
its real intent

The numbers are quite astonishing. Over just the past ten days, our analysis
estimated up to 1M “ad impressions” per day, arriving from around 3000+
publisher sites. Some use the popup script that creates new tabs on any click,
and some are designed from the ground up to redirect users to “direct links” — a
special URL provided by Monetag to trigger an ad event.

> As we delve deeper into the distribution method known as malvertising, it
> becomes clear how intricate and complicated the fake captcha campaign truly
> is. Yet, the core operations heavily rely on the ad network — essentially,
> their standard business practice is transformed for malicious use.

This investigation sets the stage for a deeper exploration of the ad network’s
ecosystem. How have they cultivated such a robust, active network of publishers
in the first place? Let’s start with analyzing what stands behind the scenes of
this distribution ecosystem…


THE AD-NETWORK: MONETAG

First, let’s delve into Monetag's operations. Becoming a publisher on this
platform is straightforward: a site owner sets up an account and, within
minutes, creates various “Advertising Zones.” These zones range from simple
banners to intrusive pop-ups that open new tabs on any user click, notifications
that persistently push ads, or a “Multi-Tag” that automates all these annoyances
at once:


Monetag — adding a script tag or all types from popup tabs, banners, push
notifications, and a multi-tag

A simple on-click triggered advertisement placement JS tag placement

Despite their simplicity and ease of integration, these JavaScript tags are just
the tip of the iceberg. Once loaded, they fetch and execute heavily obfuscated
scripts directly from Monetag’s Traffic Distribution System (TDS). These scripts
perform extensive fingerprinting of the site visitor’s browser and system,
inject tracking cookies, and even scan the website content for other networks
and tracking scripts.

These ad scripts essentially “hijack” the site, capturing clicks to spawn new ad
tabs, soliciting notification permissions, and even deploying pop-over iframes.
To ensure uninterrupted operation, Monetag cleverly circumvents ad-blockers via
special obfuscated scripts offered to publishers — for extra monetization!


Extra-Monetization in the form of a complex obfuscated tag that evades
ad-blockers

On the other hand, advertisers on the platform manage their accounts by setting
up creatives and targeting rules based on their advertising budget. Monetag’s
system then determines which ads are shown to which visitors, a process common
across all major ad networks, including giants like Facebook and Google.

Imagine the potential for misuse: an advertiser could leverage this powerful,
customizable TDS to precisely target an audience for a campaign — say, a Windows
PowerShell-based infostealer. Rather than indiscriminately spreading malware and
risking quick detection by security protocols, why not specifically target real
users not behind a virtual machine or sandbox (to skip us, researchers…)? Or
select users with high-end profiles as identified by the intrusive
fingerprinting scripts, and of course, those running the specific Windows OS
versions vulnerable to the infostealer?


THE PUBLISHERS: PIRATED CONTENT AND CLICK-BAITS

An ad network is only as effective as its funnel of users. With Monetag’s vast
catalog of publishers, the “infection chain” begins with a plethora of websites.
Yet, most of them share some characteristics that raise questions about their
nature and origin.

In our analysis, we identified approximately 3,000 publisher sites actively
using Monetag ad-zone scripts in the last ten days. These scripts track visitors
and trigger intrusive actions such as push notifications and new tab pop-ups.
For instance, the anime site “hianime[.]to” alone garnered over 100k+ unique
visits last month. Looking at the overall list shows interesting classifications
that can teach us a lot about this activity:


Monetag’s Publisher sites in the past 10 days by categories perc. of total
combined traffic

Visitors seeking anything from streaming videos to downloading academic
documents inadvertently land on these sites. A simple search like “stream anime”
can lead directly to these cloned sites, prominently positioned in Google search
results due to aggressive SEO (Search Engine Optimization):


A real example of powerful SEO - First Google Search results pointing to a
Monetag-enabled site

But the machinations don’t stop there. Monetag also promotes the use of direct
links, which circumvent the need for a website entirely. Imagine the myriad ways
to deploy these links: social media posts, instant messages, deceptive website
buttons, or even ad-ware attacks that forcibly open browser windows on your
system without your acceptance.


Social click-baits on Facebook and X pointing to Monetag’s direct links

VirusTotal: Monetag’s TDS domains direct link to Android/Desktop adware as well
as Propeller-Ads infra

So, who operates these sites? Are they legitimate businesses or mere facades for
illicit earnings? While no definitive evidence proves the latter, the uniformity
across many sites suggests a coordinated effort. Many websites, appearing unique
at first glance, share identical content and layouts, either translated or
slightly tweaked:


Copy-Paste Content Site Kits for Streaming

Public repositories on GitHub even offer ready-to-deploy website templates that
require only the insertion of ad script codes:


Example of a repo providing several streaming site kits with ready-to-go Monetag
integrations

There are so many streaming websites offering the latest movies — some of which
have not even been released yet! And all this clickbaity content is offered to
you free of charge.

If you want to get even more conspiratorial, you can argue that this entire
ecosystem of publisher sites is fueled by the ad network itself, providing site
templates, SEO optimizations, and maybe even the content itself, like pirated
movies and live sports game streams. We are not saying this is the case, but one
should judge for themselves:

Look at this “service” offering a ready-to-use video player loaded with
unlimited movies that integrate seamlessly into any site. Under the hood, this
video player iframe uses Monetag ad scripts to monetize this traffic directly
from the ad network:


Online service providing unlimited video libraries in an iframe —with integral
Monetag monetization

This service’s ubiquity across multiple web pages (and site templates ready to
deploy as mentioned above) suggests a systematic strategy to amplify traffic
and, consequently, ad revenue.


Double the fun — both video service as well as the content site monetize on
Monetag

Ha, and what about sites that never intended to monetize their content, not to
say, to infect their visitors with stealers? A branch of the publishers’
ecosystem is just compromising WordPress sites (and others, of course) to inject
their Monetag scripts directly in there. Talking about passing the buck….

Reflecting on the broader scope, the scale of potential manipulation and
malvertising becomes even more daunting if we consider all other active ad
networks combined. The statistics are so against us — if you look for content,
you will probably land on a shady ad network-enabled website quite instantly…


A MIND GAME OF PLAUSIBLE DENIABILITY

In such campaigns, responsibility is fragmented among numerous parties — each
playing a role yet avoiding full accountability. From the threat actor (the ad
network customer) to everyday internet users (the victims), a single ad click
sets off a chain reaction involving multiple service providers, domains,
servers, and stakeholders — all within milliseconds:


The chain of responsibility — how a malvertising campaign abuses the entire ads
eco-system

So, who is to blame? Who is turning a blind eye, acting irresponsibly, or
perhaps even complicit? The reality is that responsibility is widely shared, but
each player in this ecosystem has a convenient excuse:

 * The Ad Network claims it cannot moderate the creative content because it’s
   cloaked behind an ad statistics service. Yet, moderation post-approval, not
   just during initial configuration, is entirely possible.
 * The Ad Tracking Service argues it’s merely an analytics tool, leaving the
   advertiser and ad network responsible for the creative. With cloaking
   techniques, the advertiser can swap the creative after approval, avoiding
   detection.
 * The Publishers insist they’re simply monetizing their websites via
   third-party services like ad networks, distancing themselves from the
   malicious creatives delivered to their visitors.
 * The Hosting Services that provide the infrastructure for these malicious
   pages largely claim ignorance. But are they also part of the willful
   negligence that perpetuates this ecosystem?

> This fragmented chain of ownership creates a perfect storm of plausible
> deniability, making it exceptionally difficult to pinpoint and enforce
> accountability. It’s a system designed to shift blame while allowing malicious
> campaigns to thrive.


RESPONSIBLE DISCLOSURE

We reached out to Monetag and BeMob, disclosing all IOCs associated with their
TDSs, and both acted to stop the campaign’s propagation. Monetag, the primary
propagation channel abused for this campaign, responded on November 28th, 2024,
removing over 200 accounts linked to the threat actor. While this action
effectively halted the campaign on their platform, it took eight days from our
initial disclosure to implementation. Similarly, BeMob responded within four
days, removing accounts used for cloaking. These swift actions highlight how
quickly a major malvertising campaign can be dismantled when taken seriously.


Approx. Fake Captcha page views in the past 2 weeks: Disclosure Milestones

We appreciate Monetag and BeMob’s prompt responses and willingness to act
decisively. However, this campaign underscores the need for stronger proactive
measures. Ad networks must prioritize ongoing content moderation, robust account
validation to prevent fake registrations, and more accessible reporting
mechanisms for the cybersecurity community. Waiting for external reports to
address such abuses is not enough. These systems require continuous oversight to
protect not just their clients but all internet users.

Monetag shared valuable insights about the threat actor’s abuse of their
network, including the use of falsified documents and hundreds of fraudulent
accounts. Their official response is included below:

> “At Monetag, we take the security of our network, publishers, and users
> extremely seriously. Upon identifying malicious activities, we acted swiftly
> to ban over 200 accounts linked to the abuse. We remain committed to
> strengthening our defenses, working collaboratively with researchers like
> Guardio, and refining our processes to minimize abuse on our platform. The
> safety and integrity of our ecosystem are paramount, and we will continue
> investing in measures to mitigate threats effectively.” (Monetag)

Lastly, if you noticed something curious in the activity graph above - you’re
not mistaken. The campaign may have paused for a few days, but its value to the
threat actors proved too enticing to abandon. They’re back — this time
leveraging both Monetag once again as well as other ad networks. Rest assured,
we’ll continue monitoring and addressing this evolving threat:


Approx. Fake Captcha page views in the past 2 weeks: downtime and resurrection


FINAL THOUGHTS

From deceptive publisher sites offering pirated or clickbait content to complex
redirect chains and cloaking techniques, this campaign underscores how ad
networks, designed for legitimate purposes, can be weaponized for malicious
activities. The result is a fragmented chain of responsibilities, with ad
networks, publishers, ad statistics services, and hosting providers each playing
a role yet often avoiding accountability.

This fake captcha campaign is just one example that exposes the darker side of
the internet’s advertising ecosystem. While advertising is a cornerstone of the
modern internet, the same ecosystem now faces a significant conflict of interest
— creating a security gap that leaves users vulnerable.

At Guardio, we continuously reveal, track, and analyze attack vectors exploiting
foundational internet traffic systems, with ad networks being a prominent
example. The takeaway is simple: be cautious of websites offering FREE content
you would otherwise pay for. As we always say — there’s no such thing as a free
gift on the internet.




IOCS

Fake Captcha Pages:

ajmaboxanherulv1.b-cdn[.]net/JSKADull.html
ajmaboxanherulv2.b-cdn[.]net/JSKADull.html
anti-automation-v2.b-cdn[.]net/verf-v2.html
anti-automation-v3.b-cdn[.]net/verf-v3.html
anti-automation-v4.b-cdn[.]net/verf-v3.html
anti-automation-v5.b-cdn[.]net/verf-v5.html
anti-automation-v6.b-cdn[.]net/Recap-v6.html
arcivevaxue34.b-cdn[.]net
bmy7etxgksxo.objectstorage.ca-toronto-1.oci.customer-oci[.]com/n/bmy7etxgksxo/b/...
bmy7etxgksxo.objectstorage.sa-santiago-1.oci.customer-oci[.]com/n/bmy7etxgksxo/b/
bot-check-v1.b-cdn[.]net
bot-check-v2.b-cdn[.]net
bot-systemexplorer.b-cdn[.]net/recaptcha-v4-protocol-nov23.html
botcheck-encrypted-system.b-cdn[.]net/recaptcha-verification.html
check-cf-ver1.b-cdn[.]net/version3/cf-check.html
check-in-cf.b-cdn[.]net/verify/cf-check.html
dedicloadpgeing.b-cdn[.]net/dedicated-captcha-page.html
dedicloadpgeingv10.b-cdn[.]net/dedicated-captcha-page.html
dedicloadpgeingv11.b-cdn[.]net/dedicated-captcha-page.html
dedicloadpgeingv12.b-cdn[.]net/final-step-to-continue.html
dedicloadpgeingv2.b-cdn[.]net/dedicated-captcha-page.html
dedicloadpgeingv4.b-cdn[.]net/dedicated-captcha-page.html
dedicloadpgeingv5.b-cdn[.]net/dedicated-captcha-page.html
dedicloadpgeingv6.b-cdn[.]net/dedicated-captcha-page.html
dedicloadpgeingv7.b-cdn[.]net/dedicated-captcha-page.html
dedicloadpgeingv8.b-cdn[.]net/dedicated-captcha-page.html
dedicloadpgeingv9.b-cdn[.]net/dedicated-captcha-page.html
encryption-code-verification.b-cdn[.]net/recaptcha-verification.html
encryption-code-verification.b-cdn[.]net/verify-human-recaptcha.html
encryption-module-botverify.b-cdn[.]net/recaptcha-verification.html
file-typ-botcheck-v1.b-cdn[.]net/prove-human-recaptcha.html
file-typ-botcheck.b-cdn[.]net/prove-human-recaptcha.html
full-fast-movie-downloader.b-cdn[.]net/KH6kjsdNVk4sUIEW4klsw43ep8piJHOl.html
itechtics[.]com/hide-show-taskbar
izmncdnboxuse01.b-cdn[.]net/final-step-to-continue.html
izmncdnboxuse02.b-cdn[.]net/final-step-to-continue.html
izmncdnboxuse03.b-cdn[.]net/final-step-to-continue.html
izmncdnboxuse04.b-cdn[.]net/final-step-to-continue.html
izmncdnboxuse05.b-cdn[.]net/final-step-to-continue.html
izmncdnboxuse06.b-cdn[.]net/final-step-to-continue.html
izmncdnboxuse07.b-cdn[.]net/final-step-to-continue.html
newverifyyourself-system.b-cdn[.]net/recaptcha_verification-v1.html
newverifyyourself-system1.b-cdn[.]net/recaptcha_verification-new.html
nikutjyjgchr.b-cdn[.]net/RYFTGJcaptchv1.html
nikutjyjgchr.b-cdn[.]net/SYNCfuzzv2.html
nikutjyjgchrv21.b-cdn[.]net/SYNCfuzzv2.html
nikutjyjgchrv22.b-cdn[.]net/SYNCfuzzv2.html
nikutjyjgchrv23.b-cdn[.]net/SYNCfuzzv2.html
nikutjyjgchrv24.b-cdn[.]net/SYNCfuzzv2.html
nikutjyjgchrv25.b-cdn[.]net/SYNCfuzzv2.html
objectstorage.ap-mumbai-1.oraclecloud[.]com/n/bmy7etxgksxo/b/bucket-aws-vip/o/
objectstorage.ap-mumbai-1.oraclecloud[.]com/n/bmy7etxgksxo/b/buket-aws/o/
objectstorage.ap-mumbai-1.oraclecloud[.]com/n/bmy7etxgksxo/b/fetchbucket/o/
objectstorage.ap-mumbai-1.oraclecloud[.]com/n/bmy7etxgksxo/b/lusbucket/o/
objectstorage.sa-santiago-1.oraclecloud[.]com/n/bmy7etxgksxo/b/to-continue/o/
precious-valkyrie-cea580[.]netlify.app/recaptcha-sep-v2-1-baba.html
pub-7a0525921ff54f1193db83d7303c6ee8.r2[.]dev/verify-me-first-v1.html
sos-at-vie-1.exo[.]io/bucketrack/dir62/final/
sos-at-vie-1.exo[.]io/cloudcask/
sos-at-vie-2.exo[.]io/sanbuck/
sos-bg-sof-1.exo[.]io/amdbuck/
sos-bg-sof-1.exo[.]io/asgbuck/verify/hcaptcha-human-check.html
sos-ch-dk-2.exo[.]io/ataniya/bigot/
sos-ch-dk-2.exo[.]io/bucketofbits/modi-cloudflare-update-new.html
sos-ch-dk-2.exo[.]io/filebyte/
sos-ch-gva-2.exo[.]io/bytebin/
sos-ch-gva-2.exo[.]io/clouddesk/
sos-ch-gva-2.sos-cdn[.]net/bytebin/
sos-de-fra-1.exo[.]io/sandisk/step/
sys-update-botcheck.b-cdn[.]net/get-this-puzzle-solved.html
system-update-botcheck.b-cdn[.]net/security-challenge-captcha.html
upgraded-botcheck-encryption.b-cdn[.]net/verify-human-recaptcha.html
verification-module-v2.b-cdn[.]net/recaptcha_verification_updated.html
verification-module-v3.b-cdn[.]net/recaptcha_verification_updated.html
verification-module-v4.b-cdn[.]net/recaptcha_verification_updated.html
verification-module-v5.b-cdn[.]net/recaptcha_verification_updated.html
verification-module-v6.b-cdn[.]net/recaptcha_verification_updated.html
verification-module-v7.b-cdn[.]net/recaptcha_verification_updated.html
verification-module-v8.b-cdn[.]net/recaptcha_verification_updated.html
verification-module-v9.b-cdn[.]net/recaptcha_verification_updated.html
verifyyourself-newsystem.b-cdn[.]net/recaptcha_verification.html
verifyyourself-system.b-cdn[.]net/recaptcha_verification-new.html
weoidnet01.b-cdn[.]net/IQWJDolx.html
weoidnet010.b-cdn[.]net/IQWJDolx.html
weoidnet011.b-cdn[.]net/IQWJDolx.html
weoidnet012.b-cdn[.]net/IQWJDolx.html
weoidnet013.b-cdn[.]net/IQWJDolx.html
weoidnet015.b-cdn[.]net/IQWJDolx.html
weoidnet02.b-cdn[.]net/IQWJDolx.html
weoidnet03.b-cdn[.]net/IQWJDolx.html
weoidnet04.b-cdn[.]net/IQWJDolx.html
weoidnet05.b-cdn[.]net/IQWJDolx.html
weoidnet06.b-cdn[.]net/IQWJDolx.html
weoidnet07.b-cdn[.]net/IQWJDolx.html
weoidnet08.b-cdn[.]net/IQWJDolx.html
weoidnet09.b-cdn[.]net/IQWJDolx.html
ytgvjh65archi.b-cdn[.]net/
cloud-checked[.]com/cf/verify/{dddddd}/check
fiare-activity[.]com/cf/verify/{dddddd}/check
chromeupdates[.]com
marimarbahamas[.]me/downloads/index.html
cdn-downloads-now[.]xyz
fingerboarding[.]com/cha
restoindia[.]me/recaptcha/downloads
travelwithandrew[.]xyz/assets/index.html
foodrailway[.]cfd/tracker/index.php

BeMob campaign URLs used for Cloaking:

https://addonclicks[.]com/go/aa22d074-412b-41b9-ba13-7dcf967019d9
https://addonclicks[.]com/go/b37e8c6f-ddee-4501-8a45-c5a466afee72
https://adstrails[.]com/go/3a2f0420-aa82-403a-a04e-4df13708bc04
https://adstrails[.]com/go/708fba2f-fbc0-45d0-831f-4e92054b1b73
https://adstrails[.]com/go/ac3d7719-d344-478a-b3b6-06bf5461f189
https://boltsreach[.]com/go/83afb110-50f2-4b29-a93e-15e37801c7e2
https://camplytic[.]com/go/7110a328-a727-4c2c-9e88-3a71adf76cb1
https://clickzstreamer[.]com/go/7110a328-a727-4c2c-9e88-3a71adf76cb1
https://clickzstreamer[.]com/go/cdff9f96-8cbd-4c44-b679-2f612a64cd00
https://clovixo[.]com/go/35b66391-3541-4d40-a116-52515cc39b9e
https://editorcoms[.]com/go/49b491b8-09d0-422d-8735-275dc82a37ca
https://editorcoms[.]com/go/dd423e06-1ace-4a1f-80be-1790bdbbe75d
https://fineclouding[.]com/go/0160ee85-0b3d-45cf-adbd-4801966ce1dd
https://fineclouding[.]com/go/134f0807-4dc8-4a61-895c-acf5107b611a
https://fineclouding[.]com/go/7ffe1a51-dc79-4e3f-ac7e-ab76c4741738
https://fineclouding[.]com/go/83a7f27f-d3ae-4935-b854-fdf492984ed3
https://fineclouding[.]com/go/e331e010-c671-4ea5-83c7-7518b2f08b7b
https://freeofapps[.]com/go/9f900112-9d2f-41f7-a8db-cd21dd738750
https://gamebalri[.]com/go/6818d61d-1f2e-4bc0-a98b-c63669acc41f
https://gawanjaneto[.]com/go/180f58b8-38df-46cb-a0d2-d6f12d8aa8a8
https://gawanjaneto[.]com/go/7b4c672a-7787-45cc-913b-1f2f9108d002
https://getcodavbiz[.]com/go/ce1c3e68-e155-4e87-992c-b66f1485aef9
https://glidronix[.]com/go/8eb5d9be-98ca-42c4-8185-090a299eb3ef
https://godagichi[.]com/go/10a84a68-b524-4885-adb2-bfbda4c17778
https://helpmemoverand[.]com/go/26131470-304e-4f6c-b6dc-1ffd5c5a9930
https://helpmemoverand[.]com/go/a895c485-d572-4e80-bd52-9dd3540c81d9
https://helpmemoverand[.]com/go/dc3ae9c2-de16-4dc0-b614-b0b36b81f319
https://impressflow[.]com/go/f7d8c7fb-c416-4972-94cd-2f1ede1bac38
https://insigelo[.]com/go/0e94e3bf-65a0-476a-b00e-5ababc6ff856
https://insigelo[.]com/go/96f84023-dd9d-4331-9788-5705babb7f0c
https://insigelo[.]com/go/fecdc64b-280d-4ee1-9f28-96efb38acb15
https://latestgadet[.]com/go/837d85a4-fda0-4b10-89c8-c840455acb25
https://linkspans[.]com/go/7110a328-a727-4c2c-9e88-3a71adf76cb1
https://mediamanagerverif[.]com/go/2bf025b9-52c0-4587-bf7f-9a8cdd459851
https://mediamanagerverif[.]com/go/9626641b-871b-45e1-b360-84e2767326cc
https://mediamanagerverif[.]com/go/d3aa1081-e2fd-4bc5-b168-5502eae928f1
https://mytecbiz.org/go/a8b87aed-1575-4d89-b503-974f4e932152
https://nettrilo[.]com/go/4c5443a1-ba90-487a-839a-b67a2b0317a8
https://nettrilo[.]com/go/708fba2f-fbc0-45d0-831f-4e92054b1b73
https://nowuseemi[.]com/go/e594bfab-e401-456c-a4fc-63d70055ff5b
https://offerzforu[.]com/go/7a343cf8-3eb1-4b24-9534-948f237f0941
https://offerztodayforu[.]com/go/61eba7aa-81b9-4836-9636-76b263f6f8cd
https://privatemeld[.]com/go/014e411a-91a4-44b3-9da2-5954404438dc
https://privatox[.]com/go/a391ee5e-c1f4-4654-90a8-f545126dc3a7
https://provenhandshakecap[.]com/go/3442df81-6329-4d47-8594-73a9455c5363
https://provenhandshakecap[.]com/go/c33549db-0cfb-4805-a3f6-64213cd4c3a9
https://provenhandshakecap[.]com/go/d2ce67cc-16c8-4a3a-938e-c3389b412786
https://purnimaali[.]com/go/b36d4019-1072-445e-8719-8fae7640ed7f
https://reachorax[.]com/go/2f3b2ad6-8c07-4095-ad09-89abc67a495d
https://regsigara[.]com/go/a78798ba-50d8-4cef-9a64-1bd0e917da8e
https://satisfiedweb[.]com/go/3710d145-158f-4faa-942f-467142fd9201
https://scrutinycheck.cash/go/180f58b8-38df-46cb-a0d2-d6f12d8aa8a8
https://scrutinycheck.cash/go/f94e2fd6-3569-4d2d-b596-5e07f79a5818
https://searchmegood[.]com/go/49c2dac8-63b7-46d9-a9f6-6ebdaa1ce3ee
https://searchmegood[.]com/go/897a19a7-2e55-408c-94a6-d82617b5361f
https://secureporter[.]com/go/c788f30c-9d6f-4fdd-96bc-1767e250f9c5
https://servinglane[.]com/go/83864c8d-2168-4d4e-bf47-b67a99e6178a
https://sheenglathora[.]com/go/3442df81-6329-4d47-8594-73a9455c5363
https://smartlinkoffer[.]com/go/15ef9db0-585b-4c85-9ffc-a2b6e81c4bfa
https://smartlinkoffer[.]com/go/6754805d-41c5-46b7-929f-6655b02fce2c
https://smartlinkoffer[.]com/go/b11f973d-01d4-4a5b-8af3-139daaa5443f
https://spotconningo[.]com/go/3119e6d0-9df0-4116-816f-0ff62631557b
https://startingdestine[.]com/go/ad3b65a2-9255-4017-a1e1-087bcca4e2ef
https://stephighs[.]com/go/34073388-1d3a-4671-804e-036143ad82e5
https://stephighs[.]com/go/4be1a5d1-14ab-44ae-bea7-d55de09afac0
https://stephighs[.]com/go/a8e78df0-c0cb-4d55-b4e9-48ed33fd2a6e
https://stephighs[.]com/go/ce1c3e68-e155-4e87-992c-b66f1485aef9
https://streamingsplays[.]com/go/1c406539-b787-4493-a61b-f4ea31ffbd56
https://streamingsplays[.]com/go/6754805d-41c5-46b7-929f-6655b02fce2c
https://streamingsplays[.]com/go/b11f973d-01d4-4a5b-8af3-139daaa5443f
https://streamingszone[.]com/go/b3ddd860-89c0-448c-937d-acf02f7a766f
https://tagsflare[.]com/go/0c3c343a-abfa-4467-b52d-0c20711b2d7e
https://taketheright[.]com/go/ee8430f6-c0db-4d47-95db-3fdcf5941225
https://techstalone[.]com/go/2bf025b9-52c0-4587-bf7f-9a8cdd459851
https://techstalone[.]com/go/9626641b-871b-45e1-b360-84e2767326cc
https://techstalone[.]com/go/d3aa1081-e2fd-4bc5-b168-5502eae928f1
https://tracksvista[.]com/go/b67f38ca-952b-44e3-b463-126a325e85c6
https://trailsift[.]com/go/5c881316-6dd0-46cb-b9aa-2d72b614d026
https://tunneloid[.]com/go/520c3874-eeb8-4f5c-bc79-849759f17715
https://vanshitref[.]com/go/e594bfab-e401-456c-a4fc-63d70055ff5b
https://verticbuzz[.]com/go/ca526b93-0797-4fd6-b107-fdf823a5badb
https://westreamdaily[.]com/go/2912600c-ec64-47fd-93cd-d7172bc29206
https://yourtruelover[.]com/go/76c79b3b-c3bd-409a-9f9d-d25f984b6ac5
https://yourtruelover[.]com/go/d05741b5-5782-4882-b0d0-d5cbf5c14f58

50 Most Active Publisher Domains Monetizing via Monetag:

hianime[.]to
9animetv[.]to
aniwatchtv[.]to
sflix[.]to
myflixerz[.]to
hdtodayz[.]to
9minecraft[.]net
chapmanganato[.]to
y2mate[.]com
steamrip[.]com
y2meta[.]tube
tubemp4[.]is
moviesjoy[.]is
gomovies[.]sx
asuracomic[.]net
freek[.]to
flixhq[.]to
mangakakalot[.]com
coinpriceline[.]com
hurawatch[.]cc
movies2watch[.]tv
theflixertv[.]to
mangafire[.]to
z-lib[.]io
hydrahd[.]cc
cinego[.]tv
ouo[.]io
filecrypt[.]co
vipbox[.]lc
totalsportek[.]best
dopebox[.]to
sportshub[.]stream
manhwaclan[.]com
streameast[.]best
mangareader[.]to
kaido[.]to
megadb[.]net
mangabuddy[.]com
kisskh[.]co
bato[.]to
mangaread[.]org
manhuaus[.]com
gostream[.]to
alphatron[.]tv
readcomiconline[.]li
dramacool[.]bg
mixdrop[.]ps
e123movieswatch[.]com
totalsportek[.]games
aniwatch[.]to
travelmiso[.]com




SIGN UP TO DISCOVER HUMAN STORIES THAT DEEPEN YOUR UNDERSTANDING OF THE WORLD.


FREE



Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.


Sign up for free


MEMBERSHIP



Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app


Try for 5 $/month
Malvertising
Phishing
Cybersecurity
Safe Browsing
Stealer Malware


152

152

5


Follow


WRITTEN BY GUARDIO

871 Followers
·2 Following

Keeping your online identity and information secure on every corner of the web.
#SafeBrowsing Learn more at https://guard.io

Follow


RESPONSES (5)



What are your thoughts?

Cancel
Respond
Respond

Also publish to my profile

Nailaabdulrehman

13 days ago

, instant messages, deceptive website buttons, or even ad-ware attacks that
forcibly open browser windows on your system without your acceptance.

Great

18



Reply

Theo Tao

12 days ago

Woaw

Reply

Manan Bukhari

12 days ago

Good

Reply

See all responses


MORE FROM GUARDIO

Guardio


“ECHOSPOOFING” — A MASSIVE PHISHING CAMPAIGN EXPLOITING PROOFPOINT’S EMAIL
PROTECTION TO DISPATCH…


BY NATI TAL (HEAD OF GUARDIO LABS)

Jul 29
128



Guardio


“SCAMMERS PARADISE” —EXPLORING TELEGRAM’S DARK MARKETS, BREEDING GROUND FOR
MODERN PHISHING…


BY OLEG ZAYTSEV, NATI TAL (GUARDIO LABS)

Jan 29
95



Guardio


“PHISHFORCE” — VULNERABILITY UNCOVERED IN SALESFORCE’S EMAIL SERVICES EXPLOITED
FOR PHISHING…


BY OLEG ZAYTSEV, NATI TAL (GUARDIO LABS)

Aug 2, 2023
107
4



Guardio


“ETHERHIDING” — HIDING WEB2 MALICIOUS CODE IN WEB3 SMART CONTRACTS


BY NATI TAL, OLEG ZAYTSEV (GUARDIO LABS)

Oct 13, 2023
397
7


See all from Guardio



RECOMMENDED FROM MEDIUM

Harendra


HOW I AM USING A LIFETIME 100% FREE SERVER


GET A SERVER WITH 24 GB RAM + 4 CPU + 200 GB STORAGE + ALWAYS FREE


Oct 26
8.3K
132



In

UX Collective

by

Rita Kind-Envy


GOODBYE, IMMORTAL DESIGN


THIS IS THE END FOR BIALETTI — AN IMMORTAL DESIGN THAT OUTLIVED AND BURIED
(LITERALLY) ITS OWNER.


Dec 9
4.1K
75




LISTS


TECH & TOOLS

22 stories·375 saves


MEDIUM'S HUGE LIST OF PUBLICATIONS ACCEPTING SUBMISSIONS

377 stories·4272 saves


STAFF PICKS

791 stories·1533 saves


NATURAL LANGUAGE PROCESSING

1881 stories·1509 saves


Rishav anand


LEARN CLOUD PENTESTING (ROADMAP) AND EARN IN $100,000—$150,000


CLOUD PENETRATION TESTING (OR CLOUD PENTESTING) INVOLVES TESTING THE SECURITY OF
CLOUD ENVIRONMENTS, INFRASTRUCTURE, APPLICATIONS, AND…

Oct 25
256
5



In

Fourth Wave

by

Mona Lazar


IF YOU’RE PLANNING TO LEAVE TRUMP’S AMERICA, DON’T COME TO EUROPE


REALITY LOOKS DIFFERENT ON THE OTHER SIDE OF THE ATLANTIC


Dec 9
12K
388



Annie Trevaskis


ONLY 1% OF PEOPLE CAN SEE THE HIDDEN SQUIRREL IN THIS PICTURE


IN UNDER 15 SECONDS


Nov 1
6.5K
183



Jessica Stillman


JEFF BEZOS SAYS THE 1-HOUR RULE MAKES HIM SMARTER. NEW NEUROSCIENCE SAYS HE’S
RIGHT


JEFF BEZOS’S MORNING ROUTINE HAS LONG INCLUDED THE ONE-HOUR RULE. NEW
NEUROSCIENCE SAYS YOURS PROBABLY SHOULD TOO.


Oct 30
18.3K
478


See more recommendations

Help

Status

About

Careers

Press

Blog

Privacy

Terms

Text to speech

Teams


To make Medium work, we log user data. By using Medium, you agree to our Privacy
Policy, including cookie policy.