SolarMarker Malware Uses PDF’s and SEO Keywords To Spread

Share post:

Attackers behind the malware, known as SolarMarker, use PDF documents that contain search engine optimization (SEO) keywords to increase their visibility in search engines, leading potential victims to malware on a website that mimics Google Drive.

SolarMarker is a backdoor malware that steals data and credentials from infected browsers.

The hacker’s host pages on Google pages that serve as a lure for malicious downloads.

The malicious software is primarily aimed at North American users.

Once opened, the PDFs ask users to download a doc or pdf file, which then redirects users to 7 pages of TLDs such as. site,. tk and. ga.

After several redirects, users arrive at a page that is very similar to Google Drive but actually controlled by the attackers.

The page then exfiltrates stolen data to a command-and-control server and continues by creating shortcuts in the startup folder and modifying shortcuts on the desktop.

The SEO poisoning technique seems to be very effective since Microsoft 365 Defender has blocked thousands of pdf documents in different environments.

For more information, read the original story in ZDNet.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Controversial expansion of US surveillance powers nears Senate vote

The US Senate is poised to vote on a significant expansion of Section 702 of the Foreign Intelligence...

Russian-linked hackers target U.S. and European water systems

A Russian military-affiliated hacking group, Sandworm, is suspected of coordinating recent cyberattacks on water utilities in the U.S.,...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways