Malware & RansomwareHIGH

Malvertising Campaign - Tax Ads Lead to EDR Killer Deployment

CSCyber Security News
malvertisingBYOVDHuntressScreenConnectEDR killer
🎯

Basically, bad ads trick people into installing harmful software during tax season.

Quick Summary

A new malvertising campaign is exploiting tax season to deploy an EDR killer. Targeting U.S. taxpayers, this attack uses fake Google Ads to bypass security tools. Stay vigilant and only download forms from trusted sources.

What Happened

Every April, millions of Americans scramble to file their taxes, and cybercriminals are ready to exploit this urgency. A large-scale malvertising campaign has been active since January 2026, using fake tax form pages advertised through Google Ads. Victims searching for W-2 and W-9 documents are led to rogue landing pages that mimic legitimate IRS compliance portals. Once users click on these ads, they are redirected to malicious sites that ultimately deploy a kernel-mode EDR killer on their machines.

The attack begins innocently enough. A victim types "W2 tax form" into Google, clicks on a sponsored link, and ends up at anukitax[.]com, which redirects them to bringetax[.]com. Here, they unknowingly download a rogue ScreenConnect installer named form_w9.msi. ScreenConnect is a legitimate remote management tool, which makes it easier for attackers to gain access without raising suspicion.

Who's Being Targeted

This campaign primarily targets U.S. individuals, including employees, freelancers, and small business owners, who are actively searching for tax documents. The attackers are banking on the rush to file taxes, knowing that many will be less cautious during this busy season. Huntress researchers identified the campaign while conducting retrospective threat hunting, tracing over 60 rogue ScreenConnect sessions across their customer base.

Once attackers gain access through ScreenConnect, they can execute a multi-stage operation that blinds endpoint security tools. The ultimate goal appears to be either deploying ransomware or selling initial access to other malicious actors. This organized operation is not a standalone attack; it runs multiple social engineering fronts simultaneously.

Signs of Infection

Once inside the target machine, attackers deploy a multi-stage crypter called FatMalloc. This crypter uses a clever trick to evade detection by allocating large amounts of memory, which causes antivirus emulators to time out. If the security checks pass, FatMalloc executes its shellcode indirectly, making it difficult for security tools to monitor the process.

The final payload, known as HwAudKiller, uses a previously undocumented Huawei audio driver to terminate security processes like Windows Defender and Kaspersky from kernel mode. By bypassing user-mode protections, attackers can harvest credentials and run commands across the network, a behavior consistent with pre-ransomware tactics.

How to Protect Yourself

To stay safe, users should only download tax forms directly from IRS.gov and be cautious of sponsored search results for government documents. IT teams should allowlist approved remote management tools and flag any suspicious ScreenConnect instances. Monitoring Sysmon Event IDs 6 and 7045 can help detect kernel driver creation from temporary directories. Any unsigned binaries executed from ScreenConnect’s working path should be investigated immediately.

By understanding the tactics used in this campaign, individuals and organizations can better protect themselves from falling victim to these sophisticated attacks. Cybersecurity awareness is crucial, especially during high-stakes periods like tax season.

🔒 Pro insight: This campaign illustrates the need for heightened vigilance during tax season, as attackers exploit timely events to deploy sophisticated malware.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHMalware & Ransomware

Malware - DarkSword Exploit Kit Leaked for iPhones

A new exploit kit called DarkSword has been leaked, enabling hackers to target millions of iPhones. Users running outdated iOS versions are at risk. It's crucial to update your devices immediately to stay secure.

TechCrunch Security·
HIGHMalware & Ransomware

Malware - TeamPCP Deploys Iran-Targeted Wiper in Attacks

TeamPCP has launched a wiper malware targeting Iranian Kubernetes systems. This attack raises serious concerns about data loss and escalating cyber warfare. Organizations must act quickly to secure their systems.

BleepingComputer·
HIGHMalware & Ransomware

Malware - Iran-Backed Handala Uses Telegram for C2

The FBI has alerted that the Iran-backed Handala group is using Telegram to push malware targeting journalists and dissidents. This trend highlights the risks of trusted platforms being exploited for malicious activities. Organizations must stay vigilant and adapt their security measures accordingly.

SC Media·
HIGHMalware & Ransomware

Malware - North Korean Hackers Deploy StoatWaffle via VS Code

North Korean hackers are exploiting Visual Studio Code to deploy StoatWaffle malware. Developers are at risk of credential theft and system compromise. Stay alert and verify your sources to protect your data.

The Hacker News·
HIGHMalware & Ransomware

Malware - Iranian Hackers Target Opponents via Telegram

Iranian hackers are on the prowl, deploying malware via Telegram to target dissidents and journalists. This alarming campaign poses serious risks to anyone opposing the Iranian regime. Stay informed and vigilant to protect your data.

CyberScoop·
HIGHMalware & Ransomware

Malware - SEO Poisoning Campaign Delivers AsyncRAT to Users

A new SEO poisoning campaign has been discovered, targeting Windows users with trojanized software. Over 25 popular applications are being impersonated to deliver AsyncRAT malware. This sophisticated attack can lead to significant data theft, making it crucial for users to stay vigilant.

Cyber Security News·