SYMBOL | COMMON_NAME | aka. SYNONYMS |
Malsmoke primarily targets Japanese users through malvertising campaigns that deliver Zloader malware, often leveraging adult content lures and geographic IP information. The group has transitioned from exploit kits, such as Fallout, to social engineering tactics, including fake Java updates, while maintaining a focus on high-traffic adult websites. Their operations are characterized by the use of DGA for C2 server domains and the distribution of payloads via a custom loader, previously relying on Smoke Loader. Connections to past campaigns are evident through similarities in malware masquerading as Java plugins and shared registrar information among domains.
There are currently no families associated with this actor.
2020-11-16
⋅
Malwarebytes
⋅
Malsmoke operators abandon exploit kits in favor of social engineering scheme Zloader Malsmoke |