The Precursor SOC have recently been tracking threat actors continuing to abuse SEO search terms to trick users into installing malware.
Get Your 'Vulnerability Management Template' FREE!
Your Vulnerability Management Template Includes:
Secure your organisation today by completing the form for your Vulnerability Management Template.
Download the, 'How to secure Microsoft Office Desktop Deployments Technical Guide' - FREE
Complete the form to download your free technical guide and secure your organisation today.
Download the Cyber Essentials Template Policy Pack - FREE
Complete the form to download your FREE Cyber Essentials Template Pack today, including:
Download the Microsoft 365 Security Guide - FREE
Complete the form to download your FREE Microsoft 365 Security Guide today, including:
Sign up on the form and receive the guide instantly.
The Precursor Managed Detection & Response (MDR) team track many cyber threats, we have recently identified a persistently growing adversary in SEO poisoning. These attacks rely on abusing Search Engine Optimisation(SEO) to match on certain keywords their targeted victims may search for. Recently, our Incident Response team recently responded to a sophisticated incident which targeted the education and legal sector across Europe.
In this blog, Nathan Burke, one of our MDR SOC Analysts will dissect a recently discovered campaign targeting victims looking for AnyDesk and Notion websites.
Precursor collects intelligence from a variety of sources, including but not limited to network traffic analysis, threat intelligence feeds, and open-source intelligence (OSINT). Through this comprehensive approach, Precursor discovered reports related to the following domains:
These domains are examples of Typosquatting, which is a typeof cyber-attack where a threat actor registers a domain name that contain common misspellings or variations of popular or legitimate domain names. The goal is to exploit common typing errors made by users when entering web addresses. For example, a user intending to visit "example.com" might accidentally type "exampel.com". In this case the addresses being typosquatted are Anydesk.com and Notion.com
Using any run to visit the sites only amydlesk[.]com andnotliion[.]com allow a connection. Both URLs masquerade as anydesk.com posing as the ‘real’ site. However, when attempting to visit any other page on the site you are directed to a URL page not found. The exception to this is when visiting the help centre, this redirects to the official anydesk web page.
The website’s domain is hosted in the Russian Federation with the IP address of 45[.]93[.]20[.]93 as confirmed on URLscan.io.
Clicking on any of the download buttons triggers a script to be ran which automatically attempts to download a MSXI file. Checking the network tab using chrome dev tools shows that a GET request sent to https[:]//amydlesk[.]com/download/dwnl[.]php which then initiates the download located athttps[:]//monkeybeta[.]com/build/AnyDesk-x86[.]msix
When visiting monkeybeta[.]com/build, I encountered an error message indicating that I was not authorised to view the page. This corresponds to an HTTP 403 Forbidden error code. Visiting monkeybeta[.]com had no useful information and is likely just the hosting server for the malicious files.
The surge in MSIX installer malware can be attributed to the global shift towards remote work, with individuals increasingly reliant on popular applications like Zoom and AnyDesk to facilitate virtual collaboration.As remote work becomes more prevalent, treat actors will make use of this trend by distributing malicious MSIX installers disguised as legitimate software downloads. Microsoft have disabled the MSIX ms-appinstaller protocol twice already to fix vulnerabilities that allowed threat actors to use legitimate code-sign certificate software that was acquired illicitly which made the packages appear to have come from legitimate sources. "Threat actors have likely chosen the ms-appinstaller protocol handler vector because it can bypass mechanisms designed to help keep users safe from malware, such as MicrosoftDefender SmartScreen and built-in browser warnings for downloads of executable file formats," Microsoft said.
Endpoint Detection and Response (EDR) solutions are pivotal in combating MSIX installer malware. By continuously monitoring endpoint activities and scrutinising behaviour patterns, EDR solutions can swiftly flag suspicious activities linked to MSIX files. These may include unauthorised installations, file alterations, or unusual process executions. Moreover, leveraging Sysmon, a component of the Sysinternals suite, provides deeper insights into system-level activities. By configuring Sysmon to monitor specific events tied to MSIX installer activity—such as process creation, file alterations, and network connections—the SOC can swiftly identify and analyse potential indicators of compromise (IOCs) associated with MSIX malware.Proactively collecting and analysing threat intelligence sources further bolsters detection capabilities. This involves gathering indicators of compromise (IOCs), malware signatures, and known attack patterns related toMSIX installer malware. By integrating threat intelligence feeds from reputable sources like industry-specific Information Sharing and Analysis Centres (ISACs)and threat intelligence platforms, the SOC remains vigilant against emerging threats and updates detection mechanisms accordingly. Additionally, monitoring network traffic for specific indicators of compromise (IOCs) associated withMSIX installer malware, such as suspicious domain names, IP addresses, or communication protocols, aids in early detection and mitigation. LeveragingNetwork Intrusion Detection Systems (NIDS) and next-generation firewalls(NGFWs) equipped with threat intelligence capabilities enables automatic identification and blocking of connections to known malicious domains or IP addresses associated with MSIX malware distribution. This multi-faceted approach ensures robust protection against the evolving threat landscape posed by MSIX installer malware.
SEO poisoning is a rising threat that demonstrates a clear ability to circumvent popular endpoint protection and web filtering controls, due to its evasive nature and ability to acquire infrastructure via compromised Wordpress websites. Organisations should perform training and awareness exercises around the threats of malvertising and SEO poisoning. Moreover, organisations should review their capability/readiness to respond to such a threat.
Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.
We have a CREST accredited Security Operations Centre and all of our penetration testers are CREST certified.
We are accredited to the highest of standards including CREST, ISO27001, ISO9001 and Cyber Essentials Plus.
Our experts have a combined experience of over 30 years delivering security operations to sectors such as healthcare, financial services, aerospace and more.
It’s important to know what you’re getting, what’s not included and what else is available. This starts with understanding a SOC and it’s critical functions. CREST has recently published a guide to the critical functions of a SOC which aligns with the CREST SOC standard.
Enter your details here and to get the complete guide instantly sent to your inbox.
Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.
We have a CREST accredited Security Operations Centre and all of our penetration testers are CREST certified.
We are accredited to the highest of standards including CREST, ISO27001, ISO9001 and Cyber Essentials Plus.
Our experts have a combined experience of over 30 years delivering security operations to sectors such as healthcare, financial services, aerospace and more.
Precursor Security
Welcome to Precursor Security, where the forefront of cybersecurity and penetration testing expertise meets unmatched dedication and innovation. We are the architects of robust digital defences, committed to safeguarding the online realm.