Malware & RansomwareHIGH

Malware - Tax Search Ads Deliver ScreenConnect Threat

THThe Hacker News
ScreenConnectHwAudKillerGoogle AdsmalvertisingBYOVD
🎯

Basically, bad ads trick people into downloading malware that can disable their security software.

Quick Summary

A new malvertising campaign targets tax document searches, delivering malware that disables security tools. Users are at risk of serious breaches. Stay informed and protect your devices.

What Happened

A large-scale malvertising campaign has emerged, targeting individuals searching for tax-related documents in the U.S. Since January 2026, this campaign has been delivering rogue installers for ConnectWise ScreenConnect, a remote access tool. The attackers utilize a technique called bring your own vulnerable driver (BYOVD) to deploy a malicious tool named HwAudKiller. This tool effectively disables endpoint detection and response (EDR) solutions, allowing the malware to operate undetected.

The campaign cleverly abuses Google Ads to present fake ScreenConnect installers in search results. Unsuspecting users searching for terms like "W2 tax form" are led to malicious sites that trigger the installation of the malware. The attackers have been observed using commercial cloaking services to evade detection by security systems, ensuring that only real victims encounter the malicious payload.

Who's Being Targeted

The primary targets of this campaign are U.S.-based individuals searching for tax documents. This demographic is particularly vulnerable, as many are likely to be unaware of the risks associated with clicking on sponsored search results. The attackers have identified a method to ensure their malicious sites appear legitimate, significantly increasing the chances of successful infections.

The malicious ScreenConnect sessions linked to this campaign have been identified over 60 times, indicating a widespread impact. The attackers are not only targeting individual users but may also be looking to exploit their access for further malicious activities, such as deploying ransomware or selling access to other cybercriminals.

Signs of Infection

Users infected with this malware may notice unusual behavior on their systems, particularly if their security software appears to be disabled. The HwAudKiller tool operates by dropping a kernel driver that blinds security tools, making it difficult for users to detect the infection. Additionally, the malware may deploy other remote monitoring and management (RMM) tools, such as FleetDeck Agent, to maintain persistent access.

Indicators of compromise may include unexpected remote access sessions or unauthorized changes to security settings. Users should be vigilant about any suspicious activity on their devices, particularly following interactions with search ads related to tax documents.

How to Protect Yourself

To safeguard against this type of malware, users should exercise caution when clicking on sponsored search results. Always verify the legitimacy of websites before downloading any software. Implementing robust security measures, such as up-to-date antivirus software and firewalls, can also provide an additional layer of protection.

Regularly updating software and operating systems is crucial, as this can help close vulnerabilities that attackers might exploit. Users should also consider using ad blockers to reduce exposure to potentially harmful ads. Finally, educating oneself about common cyber threats can empower users to make safer online choices.

🔒 Pro insight: The use of cloaking services and BYOVD techniques demonstrates a troubling trend in malware distribution, making detection increasingly difficult for security solutions.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHMalware & Ransomware

Malware - TeamPCP Backdoors LiteLLM Versions via Trivy Compromise

TeamPCP has backdoored LiteLLM versions 1.82.7 and 1.82.8, embedding malware that steals credentials. This poses a significant risk to users and their environments. Immediate action is required to mitigate the threat.

The Hacker News·
HIGHMalware & Ransomware

Malware - TeamPCP Trojanizes LiteLLM in New Attack Campaign

TeamPCP has struck again, compromising LiteLLM with malicious packages. Users of this popular tool are at risk of losing sensitive cloud credentials. Immediate action is needed to secure environments and prevent data theft.

Wiz Blog·
HIGHMalware & Ransomware

Ransomware - How Huntress SOC Stopped a VPN Attack

A small business nearly fell victim to a ransomware attack via an unsecured VPN. Huntress SOC stepped in just in time, showcasing the vital role of human expertise in cybersecurity. This incident serves as a wake-up call for businesses to enhance their security measures and protect against potential threats.

Huntress Blog·
HIGHMalware & Ransomware

Malware - Tax Search Leads to Kernel-Mode AV/EDR Kill

A new malvertising campaign exploits tax season searches to deliver malware that disables antivirus tools. Targeting U.S. users, this attack risks credential theft and system compromise. Stay vigilant and verify sources before downloading any files.

Huntress Blog·
HIGHMalware & Ransomware

Malware - Illicit VS Code Projects Deploy StoatWaffle

North Korean hackers are using fake VS Code projects to spread StoatWaffle malware. This malware can steal sensitive data from developers. It's crucial to recognize the signs and protect yourself from such attacks.

SC Media·
HIGHMalware & Ransomware

Malware - Huntress Stops MacSync Infostealer Attack

Huntress recently thwarted a MacSync infostealer attack on macOS devices, preventing the theft of sensitive data. This incident highlights the need for robust security measures to protect against evolving threats.

Huntress Blog·