Vane and Viper Threat Groups Leveraging PropellerAds for Malvertising Campaigns

The cybersecurity landscape has recently seen increased activity from the Vane and Viper threat groups, who have been leveraging the PropellerAds advertising platform to distribute malvertising campaigns. These campaigns are designed to deliver malicious payloads to unsuspecting users by exploiting the reach and legitimacy of online advertising networks. Vane and Viper are sophisticated threat actors known for their targeted attacks and use of advanced techniques to evade detection. By utilizing PropellerAds, they capitalize on the platform's wide user base and trusted status to propagate malware more effectively. This method not only increases the infection rate but also complicates attribution and mitigation efforts for security teams. The malvertising campaigns typically involve redirecting users to exploit kits or phishing sites that deploy various malware strains. These include ransomware, banking Trojans, and information stealers, which pose significant risks to both individual users and organizations. The use of PropellerAds as a vector highlights the evolving tactics of cybercriminals who continuously adapt to bypass traditional security measures. Security experts recommend heightened vigilance and the implementation of robust endpoint protection solutions to detect and block such threats. Monitoring network traffic for unusual ad redirects and educating users about the risks associated with clicking on unsolicited ads are also critical steps in defense. This emerging threat underscores the importance of collaboration between ad networks, cybersecurity firms, and law enforcement to disrupt these malicious campaigns. As Vane and Viper continue to refine their strategies, staying informed and proactive remains essential for maintaining cybersecurity resilience.

This Cyber News was published on www.darkreading.com. Publication date: Tue, 16 Sep 2025 20:05:07 +0000


Cyber News related to Vane and Viper Threat Groups Leveraging PropellerAds for Malvertising Campaigns

Vane and Viper Threat Groups Leveraging PropellerAds for Malvertising Campaigns - The cybersecurity landscape has recently seen increased activity from the Vane and Viper threat groups, who have been leveraging the PropellerAds advertising platform to distribute malvertising campaigns. These campaigns are designed to deliver ...
3 weeks ago Darkreading.com Vane Viper
Vane Viper Generates 1 Trillion DNS Requests in DDoS Attack, Disrupts Global Networks - In a recent alarming development in the cybersecurity landscape, the Vane Viper botnet has been identified generating over 1 trillion DNS requests, causing widespread Distributed Denial of Service (DDoS) attacks that have disrupted global network ...
2 weeks ago Thehackernews.com Vane Viper
The Surge of FakeBat Malware in Search-Based Malvertising Campaigns - In recent months, cybersecurity researchers have observed a concerning surge in search-based malvertising campaigns, with documented incidents nearly doubling compared to previous periods. Amidst this uptick in online threats, one particular malware ...
1 year ago Cysecurity.news
FakeBat delivered via several active malvertising campaigns - February was a particularly busy month for search-based malvertising with the number of incidents we documented almost doubling. We saw similar payloads being dropped but also a few new ones that were particularly good at evading detection. One ...
1 year ago Malwarebytes.com Cloak
Arid Viper Campaign Targets Arabic-Speaking Users - Cybersecurity experts at Cisco Talos have exposed the latest operations of the espionage-driven Arid Viper advanced persistent threat group. The new campaign, active since April 2022, has been targeting Arabic-speaking Android users. According to an ...
1 year ago Infosecurity-magazine.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
3 months ago Cybersecuritynews.com
Cybersecurity Awareness Campaigns in Education - Cybersecurity awareness campaigns in education are essential to protect digital systems and information. The target audience for cybersecurity awareness campaigns in education includes students, teachers, administrators, and other staff members. ...
1 year ago Securityzap.com
Malvertisers zoom in on cryptocurrencies and initial access - While Zoom is used by millions of people around the world, these campaigns are likely targeting victims who are into cryptocurrencies as well as corporate users, in order to gain access to company networks. The threat actors are using a number of ...
1 year ago Malwarebytes.com Cloak
Why the Keitaro TDS keeps causing security headaches - A software company named Keitaro has long been labeled by cybersecurity vendors as a legitimate traffic distribution system vendor, yet the company's product is repeatedly used for malicious activity by cybercriminals. Despite being described as a ...
1 year ago Techtarget.com
FormBook Malware Spreads via Malvertising Using MalVirt Loader to Evade Detection - An ongoing malvertising campaign is being used to distribute virtualized. NET loaders that are designed to deploy the FormBook information-stealing malware. "The loaders, dubbed MalVirt, use obfuscated virtualization for anti-analysis and evasion ...
2 years ago Thehackernews.com
Microsoft says malvertising campaign impacted 1 million PCs - The malvertising videos redirected users to the GitHub repos that infected them with malware designed to perform system discovery, collect detailed system info (e.g., memory size, graphic details, screen resolution, operating system (OS), and user ...
7 months ago Bleepingcomputer.com
macOS Malware Mix & Match: North Korean APTs Stir Up Fresh Attacks - North Korean advanced persistent threat groups are mixing and matching components of two recently unleashed types of Mac-targeted malware to evade detection and fly under the radar as they continue their efforts to conduct operations at the behest of ...
1 year ago Darkreading.com
Staying ahead of threat actors in the age of AI - At the same time, it is also important for us to understand how AI can be potentially misused in the hands of threat actors. In collaboration with OpenAI, today we are publishing research on emerging threats in the age of AI, focusing on identified ...
1 year ago Microsoft.com Kimsuky
New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious Installers - A new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news portal to propagate a malicious installer for a popular system profiling tool called CPU-Z. "This incident is a part of a larger malvertising ...
1 year ago Thehackernews.com Cloak
TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793 - As part of this analysis, we look at threat actor TTPs employed throughout the intrusion and how they were identified and pieced together by the FortiGuard IR team. The following section of this report focuses on the activities of one of these threat ...
1 year ago Feeds.fortinet.com CVE-2023-42793 APT29
Best MDR (Managed Detection & Response) Solutions - 2025 - Cybereason Managed Detection and Response solutions provide 24/7 threat monitoring, advanced endpoint protection, and rapid incident response. Cynet MDR solutions provide automated threat detection and response, ensuring comprehensive security ...
6 months ago Cybersecuritynews.com
6 Ransomware Trends & Evolutions For 2023 - More than any other industry, cybersecurity is constantly changing. The number of major paradigm shifts that have transformed the world of cybersecurity in the past few years has been unprecedented, especially when it comes to combating ransomware. ...
2 years ago Trendmicro.com TeamTNT
Threat Intelligence Feeds Flood Analysts With Data, But Context Still Lacking - By combining external threat data with internal risk assessments, contextual threat intelligence helps organizations measure the risk level of alerts or vulnerabilities in relation to their business and technical assets, ensuring that the most ...
5 months ago Cybersecuritynews.com
North Korea's Kimsuky Attacks Rivals' Trusted Platforms - North Korea-linked threat groups are increasingly using living-off-the-land (LotL) techniques and trusted services to evade detection, with a recent Kimsuky campaign showcasing the use of PowerShell scripts and storing data in Dropbox folders, along ...
7 months ago Darkreading.com Andariel Kimsuky
State Sponsored Hackers Now Widely Using ClickFix Attack Technique in Espionage Campaigns - While currently limited to experimental usage by these state-sponsored groups, the increasing popularity of ClickFix in both cybercrime and espionage campaigns suggests the technique will likely become more widely adopted as threat actors continue to ...
5 months ago Cybersecuritynews.com Kimsuky MuddyWater
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
6 months ago Cybersecuritynews.com
Top 7 Cyber Threat Hunting Tools for 2024 - Cyber threat hunting is a proactive security measure taken to detect and neutralize potential threats on a network before they cause significant damage. To seek out this type of threat, security professionals use cyber threat-hunting tools. With ...
1 year ago Techrepublic.com
What Is Cyber Threat Hunting? - Cyber threat hunting involves proactively searching for threats on an organization's network that are unknown to traditional cybersecurity solutions. A recent report from Armis found that cyber attack attempts increased by 104% in 2023, underscoring ...
1 year ago Techrepublic.com
What Is Threat Modeling? - Threat modeling emerges as a pivotal process in this landscape, offering a structured approach to identify, assess, and address potential security threats. Threat Modeling Adoption and Implementation The successful adoption of threat modeling within ...
1 year ago Feeds.dzone.com
Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets - Recent analysis reveals that hacktivist groups have developed sophisticated methods for maximizing their visibility and impact, often targeting high-profile entities such as social media platforms, government agencies, and critical infrastructure. ...
2 months ago Cybersecuritynews.com

Cyber Trends (last 7 days)