Threat analysts at Morphisec have spotted a newly launched information-stealing malware variant called Mars Stealer.
According to the researchers, the malware uses Google Ads advertising to rank cloned OpenOffice sites high on Canadian search results.
Unknown to many, the OpenOffice installer on the cloned site is Mars Stealer executable packed with the Babadeda crypter or the Autoit loader.
Since the threat actor infect themselves with their copy of Mars Stealer during debugging, their sensitive information was also exposed.
The stolen information produced by Mars Stealer includes browser auto-fill data, browser extension data, credit cards, IP address, country code, and timezone.
The malware, a redesigned version of the Oski malware is being used for new hacking campaigns. This includes a cracked version of the malware that circulates with instructions on how to use it.
Morphisec researchers stated that Mars Stealer malware operators are heavily focused on cryptocurrency assets.
The most stolen browser plugin include MetaMask, Coinbase Wallet, Binance Wallet, and Math wallet.
Individuals and organizations can protect themselves against info-stealers by clicking on official sites and not Google Ad results. They can also protect themselves by scanning downloaded executables on their AV before launching.
For more information, read the original story in BleepingComputer.