Cybersecurity researchers have make clear a beforehand undocumented facet related to ClickFix-style assaults that hinge on making the most of a single advert community service as a part of a malvertising-driven data stealer marketing campaign dubbed DeceptionAds.
“Totally reliant on a single advert community for propagation, this marketing campaign showcases the core mechanisms of malvertising — delivering over 1 million day by day ‘advert impressions’ [in the last ten days] and inflicting hundreds of day by day victims to lose their accounts and cash by means of a community of three,000+ content material websites funneling site visitors,” Nati Tal, head of Guardio Labs, stated in a report shared with The Hacker Information.
The campaigns, as documented by a number of cybersecurity firms in latest months, contain directing guests of pirated film websites and others to bogus CAPTCHA verification pages that instruct them to repeat and execute a Base64-encoded PowerShell command, in the end resulting in the deployment of data stealers like Lumma.
The assaults are not confined to a single actor, with Proofpoint lately stating that a number of “unattributed” risk clusters have embraced the intelligent social engineering method to ship distant entry trojans, stealers, and even post-exploitation frameworks equivalent to Brute Ratel C4.

Guardio Labs stated it was in a position to hint the origins of the marketing campaign to Monetag, a platform that claims to supply a number of advert codecs to “monetize web sites, social site visitors, Telegram Mini Apps,” with risk actors additionally leveraging companies like BeMob ad-tracking to cloak their malicious intent. Monetag can also be tracked by Infoblox beneath the names Vane Viper and Omnatuor.

The marketing campaign successfully boils all the way down to this: web site homeowners (i.e., risk actors) register with Monetag, after which site visitors is redirected to a Site visitors Distribution System (TDS) operated by the malvertising advert community, in the end taking guests to the CAPTCHA verification web page.
“By supplying a benign BeMob URL to Monetag’s advert administration system as a substitute of the direct pretend captcha web page, the attackers leveraged BeMob’s popularity, complicating Monetag’s content material moderation efforts,” Tal defined. “This BeMob TDS lastly redirects to the malicious CAPTCHA web page, hosted on companies like Oracle Cloud, Scaleway, Bunny CDN, EXOScale, and even Cloudflare’s R2.”
Following accountable disclosure, Monetag has eliminated over 200 accounts linked to the risk actor. BeMob, in an analogous effort, eliminated the accounts that had been used for cloaking. That stated, there are indicators that the marketing campaign has resumed once more as of December 5, 2024.
The findings as soon as once more spotlight the necessity for content material moderation and strong account validation to stop pretend registrations.
“From misleading writer websites providing pirated or clickbait content material to complicated redirect chains and cloaking methods, this marketing campaign underscores how advert networks, designed for legit functions, could be weaponized for malicious actions,” Tal stated.
“The result’s a fragmented chain of duties, with advert networks, publishers, advert statistics companies, and internet hosting suppliers every enjoying a job but typically avoiding accountability.”