Resurgence of SEO Poisoning - 20230119001¶
Overview¶
The WA SOC has observed a resurgence in SEO Poisoning campaigns.
Delivery¶
Historically, SEO Poisoning campaigns are malicious actors setting up fake websites for popular free and open-source software to promote malicious downloads through advertisements in Google search results.
Detection and Remediation¶
Detection¶
- Identify the presence of the below supplied KQL/ Kusto hunting code
- Identify the presence of the below supplied IOCs
- Inspect activity from the identified devices and/or users
Recommended Remediation Steps¶
- Run a full Antivirus scan on the compromised device
- Reset the affected user's passwords
- Implement MFA if required
Reference¶
- Blog Article "Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner": https://www.bleepingcomputer.com/news/security/hackers-push-malware-via-google-search-ads-for-vlc-7-zip-ccleaner/
- Internet Crime Crime Complain Center (IC3) Advisory: https://www.ic3.gov/Media/Y2022/PSA221221
Indicator of Compromise¶
KQL Query¶
Note the below domains have not been defanged, please exercise caution when utilizing. //Known Domain clicks
Domain Names¶
Note the below domains have not been defanged, please exercise caution when utilizing.