
Microsoft Threat Intelligence reports that the campaign was launched in December 2024: unknown attackers started distributing links that loaded ads. Microsoft claims that websites hosting such ads were illegal streaming websites offering pirated videos. The company’s report mentions two streaming website domains: movies7[.]net and 0123movie[.]art.
“The streaming websites embedded malvertising redirectors within movie frames to generate pay-per-view or pay-per-click revenue from malvertising platforms,” – Microsoft.

Malicious links contained within an iframe were taking victims through a chain of redirects and a number of intermediate sites (e.g. a scam tech support site) ultimately leading to GitHub repositories containing a variety of malicious files.
Malware was deployed in several stages. At early stages, information on the user’s device was collected, presumably to configure subsequent attack stages. At later stages, malware detectors were disabled, a connection was established with control servers, and the NetSupport remote monitoring and management software was installed.
“Depending on the second-stage payload, either one or multiple executables are dropped onto the compromised device, and sometimes an accompanying encoded PowerShell script. These files initiate a chain of events that conduct command execution, payload delivery, defensive evasion, persistence, C2 communications, and data exfiltration,” – Microsoft.
In addition to GitHub, payloads were also hosted on Discord and Dropbox.

Microsoft experts believe that this campaign was opportunistic in nature (i.e. the cybercriminals attacked everyone without distinction and didn’t target specific persons, companies, or industries). As a result, devices belonging to both individuals and various organizations were impacted.
After penetrating into the victim’s system, the malware (mostly the Lumma stealer or an updated version of the Doenerium open-source info stealer) accessed browser data files to steal login cookies, passwords, histories, and other sensitive information:
- AppDataRoamingMozillaFirefoxProfiles<user profile uid>.default-releasecookies.sqlite;
- AppDataRoamingMozillaFirefoxProfiles<user profile uid>.default-releaseformhistory.sqlite;
- AppDataRoamingMozillaFirefoxProfiles<user profile uid>.default-releasekey4.db;
- AppDataRoamingMozillaFirefoxProfiles<user profile uid>.default-releaselogins.json;
- AppDataLocalGoogleChromeUser DataDefaultWeb Data;
- AppDataLocalGoogleChromeUser DataDefaultLogin Data; and
- AppDataLocalMicrosoftEdgeUser DataDefaultLogin Data.
The attackers also attempted to access files stored on Microsoft OneDrive and scanned infected systems for cryptocurrency wallets, including Ledger Live, Trezor Suite, KeepKey, BCVault, OneKey, and BitBox.
According to Microsoft, first-stage reports were digitally signed with a newly-created certificate. In total, 12 certificates used in the malvertising campaign were identified and subsequently revoked by the company.

2025.01.26 — Cisco patched a critical vulnerability in Meeting Management
Cisco released updates to fix a critical (CVSS score: 9.9) vulnerability in Meeting Management. The bug enables an unprivileged remote authenticated attacker to gain administrative privileges. The vulnerability…
Full article →
2025.03.26 — Cloudflare to block all unencrypted traffic to its APIs
According to Cloudflare, effective immediately, only secure HTTPS connections to api.cloudflare.com will be accepted; while all HTTP ports are to be closed. The purpose of this decision…
Full article →
2025.02.07 — 768 vulnerabilities were exploited by hackers in 2024
According to VulnCheck, 768 CVEs were registered as exploited in real-life attacks in 2024. This is 20% greater compared to 2023 when hackers exploited 639 vulnerabilities. Interestingly,…
Full article →
2025.04.04 — Privilege escalation vulnerability in Google Cloud resulting in sensitive data leaks finally patched
Tenable Research revealed details of a recently patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run enabling an attacker to gain access to container images…
Full article →
2025.03.12 — Mass exploitation of PHP-CGI vulnerability in attacks targeting Japanese companies
GreyNoise and Cisco Talos experts warn that hackers are actively exploiting CVE-2024-4577, a critical PHP-CGI vulnerability that was discovered and fixed in early June 2024. CVE-2024-457…
Full article →
2025.04.30 — Coinbase fixes 2FA bug that made customers panic
Cryptocurrency exchange Coinbase has fixed a bug in its Account Activity logs that caused customers to think their credentials were compromised. Earlier this month, BleepingComputer…
Full article →
2025.03.28 — Zero-day vulnerability in Windows results in NTLM hash leaks
Security experts reported a new zero-day vulnerability in Windows that enables remote attackers to steal NTLM credentials by tricking victims into viewing malicious files in Windows…
Full article →
2025.03.05 — Polish Space Agency disconnects its network due to hacker attack
Last weekend, the Polish Space Agency (POLSA) had to disconnect all of its systems from the Internet to localize an attack targeting its IT infrastructure. After discovering the intrusion,…
Full article →
2025.04.07 — Critical RCE vulnerability discovered in Apache Parquet
All versions of Apache Parquet up to and including 1.15.0 are affected by a critical remote code execution (RCE) vulnerability whose CVSS score is 10 out…
Full article →
2025.02.09 — Abandoned AWS S3 buckets could be used in attacks targeting supply chains
watchTowr discovered plenty of abandoned Amazon S3 buckets that could be used by attackers to deliver malware and backdoors to government agencies and large corporations. The researchers discovered…
Full article →