Chinese-Speaking Users Targeted by Malicious Google Ads

, malvertising

In an alarming trend, cybersecurity experts have determined that Chinese-speaking users are increasingly falling prey to malicious Google ads. This advanced malvertising campaign, dubbed “FakeAPP,” is an insidious operation that lures individuals into downloading imitations of popular messaging applications such as Telegram and LINE. Initially, the campaign set its sights on Hong Kong in October 2023, but has since expanded, now ensnaring unsuspecting users with fake websites cunningly hosted on Google Docs or Google Sites.

The elaborate trap is laid by abusing Google advertiser accounts, funneling users toward downloads packed with Remote Administration Trojans (RATs). These RATs transfer complete control of the victim’s machine to the attacker, permitting the deployment of further malware. The culprits behind these malicious ads have utilized the online guise of Nigerian firms—Interactive Communication Team Limited and Ringier Media Nigeria Limited, unmasked by diligent effort from [Malwarebytes](https://www.malwarebytes.com/blog/threat-intelligence/2024/01/malicious-ads-for-restricted-messaging-applications-target-chinese-users).

Adding to the onslaught, there’s a marked rise in the exploitation of “Greatness”—a phishing-as-a-service (PhaaS) platform finessed for designing authentic-appearing credential harvesting pages, which pose a dire threat especially to Microsoft 365 users. This nefarious platform, spotlighted by [Trustwave SpiderLabs](https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trustwave-spiderlabs-detects-spike-in-greatness-phishing-kit-attacks-on-microsoft-365-users/), enables personalized attacks and equips perpetrators with tools to sidestep spam filters and elude detection.

Primarily, these attack vectors are unleashed through phishing emails bearing malignant HTML attachments. These attachments execute a chain reaction—guiding recipients to bogus login pages designed to snare their credentials. The information filched is then covertly funneled out via Telegram, with the concomitant risk of introducing additional malware into the system.

It doesn’t stop there. South Korean companies have also been targeted with sophisticated phishing attacks impersonating local tech giants like Kakao. These assaults employ malicious Windows shortcut files disguised as legitimate documents. As uncovered by [AhnLab’s Security Intelligence Center](https://asec.ahnlab.com/en/60805/), AsyncRAT (VenomRAT) takes cover behind the façade of benign files, only to spring into action pilfering user data and credentials when executed.

The stark similarity of these cybersecurity breaches underscores a growing, global cyberspace battleground where vigilance is non-negotiable. Users must heed warnings, distinguish between authentic and suspect sources, and guard against promises too good to be true. As the complex web woven by attackers expands, staying informed and prepared remains our most potent defense.

If you enjoyed this article, please check out our other articles on CyberNow

January 27, 2024
An advanced malvertising campaign known as 'FakeAPP' is targeting Chinese-speaking users, leading to a surge in phishing and RAT attacks.