Home > Cyber News > CVE-2021-1801 macOS Bug Exploited by ScamClub Malvertising Group

CVE-2021-1801 macOS Bug Exploited by ScamClub Malvertising Group

Malvertising campaigns (short for malicious advertising) could bring a variety of malicious payloads by exploiting various vulnerabilities.

The latest such malvertising campaign coordinated by the ScamClub group exploited a zero-day in WebKit-based browsers. The end goal of the operation was to inject malicious payloads that redirect users to sites designed for gift card scams.

ScamClub Malvertising and CVE-2021-1801

The malvertising campaign, first observed by Confiant in June last year, exploited the critical CVE-2021-1801 vulnerability. According to the official information, the vulnerability was first discovered in Apple macOS up to 11.1 by researcher Eliya Stein of Confiant.

Apple’s advisory says that the flaw affects the iframe sandboxing policy by using maliciously crafted web content. “This issue was addressed with improved iframe sandbox enforcement,” the advisory said. In other words, the vulnerability allowed threat actors to bypass the iframe sandboxing policy the WebKit browser engine powering Safari and Google Chrome.

“Active for at least several years now, ScamClub malvertisements are defined mainly by forced redirections to scams that offer prizes to “lucky” users, like the all too ubiquitous “You’ve won a Walmart giftcard!” or “You’ve won an iPhone!” landing pages,” Confiant said in their report.

As visible by the screenshots Confiant shared, the tricks used by the ScamClub group are well-known and widely used by various scammers. Maybe you’ve come across similar intrusive pop-ups while browsing online. For example, a popular approach utilized by scammers is employing the names of popular brands such as Amazon (“Congratulations Dear Amazon Customer” pop-ups).

We have covered several scams that utilize the gift card approach, like:

In terms of the techniques ScamClub applied, the attackers relied on the so-called “bombardment strategy”:

Instead of trying to fly under the radar, they flood the ad tech ecosystem with tons of horrendous demand well aware that the majority of it will be blocked by some kind of gatekeeping, but they do this at incredibly high volumes in the hopes that the small percentage that slips through will do significant damage.

More technical details are available in the original Confiant report.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share