Google Advertising Out to Lunch? Simple Pivots Catch an Ongoing Malvertising Campaign Hiding in Plain Sight

threat

Key Findings

  • Silent Push Threat Analysts have caught a threat actor’s ongoing series of malvertising campaigns blatantly abusing Google Search ads to target graphic design professionals.
  • We documented at least 10 malvertising campaigns hosted exclusively on two IP addresses: 185.11.61[.]243 and 185.147.124[.]110.
  • Together with our research partners, we found that the sites from the two IP addresses were being launched in Google Search advertising campaigns, and all of them led to malicious downloads.

Executive Summary

When it comes to tracking threat actors, Silent Push Threat Analysts understand this process can be complex, and it’s not uncommon for certain organizations to track one threat actor more effectively than others. These types of cases generally occur due to gaps in visibility or a lack of access to certain intelligence.

Conducting a simple process to look up which IP address is hosting a domain and then investigating that IP address for other similar domains, however, is not a complex task. It’s a beginner pivot, something any junior threat analyst can accomplish.

And yet, it appears that the Google advertising team is not even going that far to stop a series of malvertising campaigns that have been going on for nearly a month, targeting graphic design professionals.

Domains have been launched day after day, week after week, since at least November 13, 2024, for malvertising campaigns hosted on two dedicated IP addresses: 185.11.61[.]243 and 185.147.124[.]110.

Sites stemming from these two IP ranges are being launched in Google Search advertising campaigns, and all lead to a variety of malicious downloads, according to our research partners.

In the last month, Silent Push Threat Analysts have documented at least ten distinct malvertising campaigns, launched via Google ads, that make use of domains mapped to one of these two IP ranges.


Sign up for a free Silent Push Community account

Register for our free Community Edition to use all of the tools and queries mentioned in this blog.


Dedicated Ranges Clearly Owned by a Single Threat Actor

Starting with the first IP address 185.11.61[.]243, at the time of this writing, 109 unique domains were mapped to it, all seemingly for this graphic design/CAD malvertising campaign. The first domains were added on July 29, 2024, and the most recent domains mapped to it were from November 25, 2024:

Screenshot of domains mapped to 185.11.61[.]243

Meanwhile, 185.147.124[.]110 currently has 85 unique domains mapped to it, with the first domains added on November 25, 2024, and the newest domains mapped as recently as December 13, 2024:

Screenshot of domains mapped to 185.147.124[.]110

On November 13, 2024, the malvertising campaign first launched with frecadsolutions[.]com, hosted on 185.11.61[.]243 since November 6, 2024. From here, we noticed that the IP address hosted dozens of other similar domains and assumed they could be for similar malvertising purposes.

The first malvertising campaign was launched with frecadsolutions[.]com

On November 14, 2024, a malvertising campaign was launched using frecadsolutions[.]cc (note the subtle TLD difference of “cc” vs. “com”), which had also been hosted on 185.11.61[.]243 since November 6, 2024. This made use of Bitbucket for its malicious download, which is normally a legitimate file hosting site.

Next, a second malvertising campaign was launched using frecadsolutions[.]cc

On November 26, 2024, a malvertising campaign was launched on freecad-solutions[.]net, which had been hosted on 185.11.61[.]243 from November 1, 2024 to November 26, 2024, and then moved to 185.147.124[.]110, where it has since remained.

A third malvertising campaign was launched on freecad-solutions[.]net

On November 27, 2024, a malvertising campaign was launched on frecadsolutions[.]org, which had been hosted on 185.11.61[.]243 from November 6, 2024 to November 26, 2024, and then moved to 185.147.124[.]110, where it has since remained.

The fourth malvertising campaign was launched on frecadsolutions[.]org

On November 27, 2024, a malvertising campaign was launched with rhino3dsolutions[.]io, which had been hosted on 185.11.61[.]243 from November 17, 2024, to November 26, 2024, and then on 185.147.124[.]110 from November 26, 2024, to present.

A fifth malvertising campaign was launched with rhino3dsolutions[.]io

On November 27, 2024, a malvertising campaign was launched with rhino3dsolutions[.]org, which had been hosted on 185.11.61[.]243 from November 18, 2024, to November 26, 2024, and then on 185.147.124[.]110 from November 27, 2024, to present.

The sixth malvertising campaign was launched with rhino3dsolutions[.]org

On November 27, 2024, a malvertising campaign was launched with rhino3dsolutions[.]net, which had been hosted on 185.11.61[.]243 from November 17, 2024, to November 26, 2024, and then on 185.147.124[.]110 from November 26, 2024 to present.

A seventh malvertising campaign was launched with rhino3dsolutions[.]net

On December 5, 2024, a malvertising campaign was launched with planner5design[.]net, which had been hosted on 185.147.124[.]110 from December 1, 2024 to December 6, 2024.

The eighth malvertising campaign was launched with planner5design[.]net

On December 9, 2024, a malvertising campaign was launched with onshape3d[.]org, which had been hosted on 185.147.124[.]110 from December 1, 2024, to present.

The ninth malvertising campaign was launched with onshape3d[.]org

On December 10, 2024, a malvertising campaign was launched with frecad3dmodeling[.]org that had been hosted on 185.147.124[.]110 from December 8, 2024, to present.

A tenth malvertising campaign was launched with frecad3dmodeling[.]org

Special Thanks to Our Research Partners

Silent Push analysts would like to thank the collaboration with our research partners who initially highlighted these malvertising domains. While we don’t have complete visibility into these malvertising efforts and don’t currently have any malware analysis to share just yet, we certainly have the data to pivot into their hosting infrastructure. By partnering together in trusted research-sharing circles, we’re able to find and highlight complex threats such as these – and for those efforts, we salute you.

If you are interested in joining a research-sharing effort or simply have interesting threats to share that you would like our help with, please feel free to reach out to us at info@silentpush[.]com.


Mitigation

Silent Push believes all malvertising domains pose significant risks, especially to corporate environments.

Our analysts have constructed a Silent Push IOFA Feed that provides a list of Indicators of Future Attack domains focused on malvertising, along with an IOFA Feed containing suspect Malvertising IPs.

Silent Push IOFA Feeds are available as part of an Enterprise subscription. Enterprise users can ingest IOFA Feed data into their security stack to inform their detection protocols or use it to pivot across attacker infrastructure using the Silent Push Console and Feed Analytics screen.


Register for Community Edition

Silent Push Community Edition is a free threat-hunting and cyber defense platform featuring a range of advanced offensive and defensive lookups, web content queries, and enriched data types, including Silent Push Web Scanner and Live Scan.

Click here to sign up for a free account.


Indicators of Future Attacks (IOFAs)

Here is a sample list of IOFAs – our full list is available for enterprise users. Silent Push Enterprise clients have access to a domain and IP feed containing this malvertising infrastructure.

  • 185.147.124[.]110
  • 185.11.61[.]243
  • calibrebook[.]com
  • calibrebook[.]net
  • frecad3dmodeling[.]net
  • frecad3dmodeling[.]org
  • frecad3dsolutions[.]com
  • frecad3d-solutions[.]com
  • frecad-3dsolutions[.]com
  • frecad3d-solutions[.]net
  • frecad-3dsolutions[.]net
  • frecad3dsolutions[.]org
  • frecad-3dsolutions[.]org
  • frecaddevelop[.]com
  • frecaddevelop[.]org
  • frecaddevelopment[.]com
  • frecaddevelopment[.]net
  • frecaddevelopment[.]org
  • frecadmodeling[.]com
  • frecadmodeling[.]net
  • frecadmodeling[.]org
  • frecadsolution[.]net
  • frecadsolutions[.]cc
  • frecadsolutions[.]org
  • frecad-solutions[.]org
  • freecad3dsolution[.]net
  • freecad3dsolutions[.]com
  • freecadblog[.]com
  • freecadblog[.]io
  • freecadblog[.]net
  • freecadblogs[.]net
  • freecad-solutions[.]net
  • freecadsolutionsllc[.]com
  • freeecadmodeling[.]net
  • onshape3d[.]com
  • onshape3d[.]org
  • onshapedev[.]net
  • onshapedevelop[.]com
  • onshapedevelop[.]net
  • onshapedevelop[.]org
  • planner5ddevelop[.]com
  • planner5ddevelop[.]net
  • planner5design[.]com
  • planner5design[.]net
  • planner5designs[.]com
  • planner5designs[.]org
  • recad3dsolutions[.]org
  • rhino3dsolutions[.]io
  • rhino3dsolutions[.]net
  • rhino3dsolutions[.]org
  • rhinoceros-3d[.]com