BleepingComputer reports that threat actors have launched a Microsoft Defender tech support scam facilitated by a seemingly legitimate Amazon ad found on top of search results in Google.
Clicking on the fraudulent ad, which shows the real URL of Amazon, triggers a redirection to a fake Microsoft Defender alert warning of infection with the ads(exe).finacetrack(2).dll malware, with the scam launching in full-screen mode. Closing Google Chrome will not hinder the scam, which prompts the restoration of previously closed pages upon relaunching the browser.
Such a campaign comes after a fraudulent YouTube ad was reported by Malwarebytes last June to have been leveraged to facilitate the same tech support scam.
Malvertising campaigns involving Google ads have become increasingly prevalent during the past 12 months, with the Royal ransomware operation previously reported to have used Google ads to enable the deployment of Cobalt Strike beacons for initial network access in future ransomware attacks.
More severe of the two issues — both of which have been discovered and reported by TZL security researchers during the Matrix Cup hacking competition in China — is the critical remote code execution flaw, tracked as CVE-2024-38812, which stems from a vCenter DCE/RPC protocol heap overflow issue.
Integration of a Fortinet plugin exploiting the yet-to-be-patched zero-day into its newest iteration has enabled DeepData to facilitate the identification and decryption of credentials and server details from VPN process memory-stored JSON objects, which are then exfiltrated by the DeepPost malware, according to a Volexity report.
Malicious actors could leverage the vulnerability, which stems from improper user check error management in the two-factor REST API action, to facilitate high-privileged account breaches that could then be used for additional attacks, according to Defiant, a WordPress security provider.