Article 5MTGR With help from Google, impersonated Brave.com website pushes malware

With help from Google, impersonated Brave.com website pushes malware

by
Dan Goodin
from Ars Technica - All content on (#5MTGR)
scam-website-800x534.jpeg

Enlarge (credit: Getty Images)

Scammers have been caught using a clever sleight of hand to impersonate the website for the Brave browser and using it in Google ads to push malware that takes control of browsers and steals sensitive data.

The attack worked by registering the domain xn--brav-yva[.]com, an encoded string that uses what's known as punycode to represent brav[.]com, a name that when displayed in browser address bars is confusingly similar to brave.com, where people download the Brave browser. Brav[.]com (note the accent over the letter E) was almost a perfect replica of brave.com, with one crucial exception: the Download Brave" button grabbed a file that installed malware known both as ArechClient and SectopRat.

fake-brave-site-640x299.jpg

(credit: Jonathan Sampson)

From Google to malware in 10 seconds flat

To drive traffic to the fake site, the scammers bought ads on Google that were displayed when people searched for things involving browsers. The ads looked benign enough. As the images below show, the domain shown for one ad was mckelveytees.com, a site that sells apparel for professionals.

Read 10 remaining paragraphs | Comments

index?i=eGuz-lNICjg:Ec0DylZ6EaU:V_sGLiPB index?i=eGuz-lNICjg:Ec0DylZ6EaU:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments