Microsoft Security Blog: Malvertising campaign leads to info stealers hosted on GitHub

Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/
Source: Microsoft Security Blog
Title: Malvertising campaign leads to info stealers hosted on GitHub

Feedly Summary: Microsoft detected a large-scale malvertising campaign in early December 2024 that impacted nearly one million devices globally. The attack originated from illegal streaming websites embedded with malvertising redirectors and ultimately redirected users to GitHub to deliver initial access payloads as the start of a modular and multi-stage attack chain.
The post Malvertising campaign leads to info stealers hosted on GitHub appeared first on Microsoft Security Blog.

AI Summary and Description: Yes

**Summary:**
The text discusses a large-scale malvertising campaign detected by Microsoft Threat Intelligence in December 2024. This attack, which affected nearly one million devices worldwide, leveraged illegal streaming websites to distribute malware via GitHub and other platforms. The campaign utilized a multi-stage attack chain to exfiltrate data and compromise systems, emphasizing the need for robust security measures and awareness among organizations.

**Detailed Description:**
The document outlines a sophisticated malvertising campaign that incorporates various techniques aimed at data theft. Here are the major points and their significance:

– **Origin and Impact of the Attack:**
– The attack commenced from illegal streaming sites, exploiting malvertising redirection techniques to route victims to GitHub and other platforms.
– Nearly one million devices across diverse industries were affected, demonstrating the campaign’s reach.

– **Attack Chain Overview:**
– The attack utilized a multi-stage methodology:
– **First Stage:** Malware was installed as a dropper from GitHub which set the groundwork for further payloads.
– **Second Stage:** The malware performed system discovery and data exfiltration, encoding sensitive information and sending it to a command and control (C2) server.
– **Subsequent Stages:** More advanced malware was deployed, orchestrating tasks like data exfiltration, command execution, and maintaining persistence on compromised systems.

– **Malware Deployment:**
– The text describes various malware types and their functions, including information stealers and remote access tools (RATs) such as Lumma Stealer and NetSupport.
– The use of living-off-the-land techniques (LOLBAS) was noted, allowing attackers to blend malicious activity with legitimate operating system processes to evade detection.

– **Indicators of Compromise (IOCs):**
– The document lists numerous IOCs, including file names, command and control domains, and redirection URLs that security teams can use for detection and remediation.

– **Recommendations for Mitigation:**
– Microsoft offers multiple recommendations for organizations to enhance their security posture:
– Strengthening configurations in Microsoft Defender products and enforcing multifactor authentication (MFA).
– Implementing network protections and monitoring tools to detect threats promptly.
– Encouraging the use of secure browsing practices and employee training to recognize phishing attacks.

– **Threat Intelligence Sharing:**
– The report emphasizes the importance of collaboration and timely sharing of threat intelligence across organizations to better prepare for and respond to similar campaigns in the future.

This analysis equips security and compliance professionals with insights into current threats, effective defenses, and the necessity for continuous vigilance against evolving cyber threats.