{"id":137793,"date":"2025-03-06T09:00:00","date_gmt":"2025-03-06T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=137793"},"modified":"2025-03-06T14:19:22","modified_gmt":"2025-03-06T22:19:22","slug":"malvertising-campaign-leads-to-info-stealers-hosted-on-github","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/03\/06\/malvertising-campaign-leads-to-info-stealers-hosted-on-github\/","title":{"rendered":"Malvertising campaign leads to info stealers hosted on GitHub"},"content":{"rendered":"\n
In early December 2024, Microsoft Threat Intelligence detected a large-scale malvertising campaign that impacted nearly one million devices globally in an opportunistic attack to steal information. The attack originated from illegal streaming websites embedded with malvertising redirectors, leading to an intermediary website where the user was then redirected to GitHub and two other platforms. The campaign impacted a wide range of organizations and industries, including both consumer and enterprise devices, highlighting the indiscriminate nature of the attack.<\/p>\n\n\n
\n\t\t\tLearn more about this malvertising campaign's multi-stage attack chain\t\t<\/p>\n\t\t\n\t\t\tListen to the Microsoft Threat Intelligence podcast<\/span> <\/span>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n\n\n\n GitHub was the primary platform used in the delivery of the initial access payloads and is referenced throughout this blog post; however, Microsoft Threat Intelligence also observed one payload hosted on Discord and another hosted on Dropbox.<\/p>\n\n\n\n The GitHub repositories, which were taken down, stored malware used to deploy additional malicious files and scripts. Once the initial malware from GitHub gained a foothold on the device, the additional files deployed had a modular and multi-stage approach to payload delivery, execution, and persistence. The files were used to collect system information and to set up further malware and scripts to exfiltrate documents and data from the compromised host. This activity is tracked under the umbrella name Storm-0408 that we use to track numerous threat actors associated with remote access or information-stealing malware and who use phishing, search engine optimization (SEO), or malvertising campaigns to distribute malicious payloads.<\/p>\n\n\n\n In this blog, we provide our analysis of this large-scale malvertising campaign, detailing our findings regarding the redirection chain and various payloads used across the multi-stage attack chain. We further provide recommendations for mitigating the impact of this threat, detection details, indicators of compromise (IOCs), and hunting guidance to locate related activity. By sharing this research, we aim to raise awareness about the tactics, techniques, and procedures (TTPs) used in this widespread activity so organizations can better prepare and implement effective mitigation strategies to protect their systems and data.<\/p>\n\n\n\n We would like to thank the GitHub security team for their prompt response and collaboration in taking down the malicious repositories.<\/p>\n\n\n\n Since at least early December 2024, multiple hosts downloaded first-stage payloads from malicious GitHub repositories. The users were redirected to GitHub through a series of other redirections. Analysis of the redirector chain determined the attack likely originated from illegal streaming websites where users can watch pirated videos. The streaming websites embedded malvertising redirectors within movie frames to generate pay-per-view or pay-per-click revenue from malvertising platforms. These redirectors subsequently routed traffic through one or two additional malicious redirectors, ultimately leading to another website, such as a malware or tech support scam website, which then redirected to GitHub.<\/p>\n\n\n\n Multiple stages of malware were deployed in this campaign, as listed below, and the several different stages of activity that occurred depended on the payload dropped during the second stage.<\/p>\n\n\n\n The full redirect chain was composed of four to five layers. Microsoft researchers determined malvertising redirectors were contained within an iframe<\/a> on illegal streaming websites.<\/p>\n\n\n There were several redirections that occurred before arriving at the malicious content stored on GitHub.<\/p>\n\n\n\n Once the redirection to GitHub occurred, the malware hosted on GitHub established the initial foothold on the user\u2019s device and functioned as a dropper for additional payload stages and running malicious code. The additional payloads included information stealers to collect system and browser information on the compromised device, of which most were either Lumma stealer or an updated version of Doenerium<\/a>. Depending on the initial payload, the deployment of NetSupport, a remote monitoring and management (RMM) software, was also often deployed alongside the infostealer. Besides the information stealers, PowerShell, JavaScript, VBScript, and AutoIT scripts were run on the host. The threat actors incorporated use of living-off-the-land binaries and scripts (LOLBAS) like PowerShell.exe<\/em>, MSBuild.exe<\/em><\/a>,<\/em> and RegAsm.exe<\/em> for C2 and data exfiltration of user data and browser credentials.<\/p>\n\n\n\n After the initial foothold was gained, the activity led to a modular and multi-stage approach to payload delivery, execution, and persistence. Each stage dropped another payload with a different function, as outlined below. Actions conducted across these stages include system discovery (memory, GPU, OS, signed-in users, and others), opening browser credential files, Data Protection API (DPAPI) crypt data calls, and other functions such as obfuscated script execution and named pipe creations to conduct data exfiltration. Persistence was achieved through modification of the registry run keys and the addition of a shortcut file to the Windows Startup<\/em> folder.<\/p>\n\n\n\n Several stages of malicious activity to conduct deployment of additional malware, collections, and exfiltration of data to a C2 were observed. While not every single initial payload followed these exact steps, this is an overall view of what occurred across most incidents analyzed:<\/p>\n\n\n During the first stage, a payload is dropped onto the user\u2019s device from the binary hosted on GitHub, establishing a foothold on that device. As of mid-January 2025, the first-stage payloads discovered were digitally signed with a newly created certificate. A total of twelve different certificates were identified, all of which have been revoked.<\/p>\n\n\n\n Most of these initial payloads dropped the following legitimate files to leverage their functionality. These files were either leveraged by the first-stage payload or by later-stage payloads, depending on the actions being conducted.<\/p>\n\n\n\nGitHub activity and redirection chain<\/h2>\n\n\n\n
\n
Attack chain<\/h2>\n\n\n\n
First-stage payload: Establishing a foothold on the host<\/h3>\n\n\n\n