Tech News

Vulnerability in WebKit engine could redirect iOS and macOS users to scam sites

Confiant experts report that malicious ads have been abusing a zero-day vulnerability in WebKit browsers engine (CVE-2021-1801) since last year, and although the patches were released in early February, attacks are still ongoing. Due to this vulnerability, users were sent from trusted resources to fraudulent sites.

According to researchers, a hack group called ScamClub, active since 2018, is behind the attacks. As previously mentioned by experts, in general the tactics of grouping are simple: usually attackers buy a large number of ad slots on multiple platforms, hoping that at least some of the malicious ads will eventually pass security checks. Even if most of the ads are blocked, the ads that hit the post will eventually be enough for a full-scale campaign.

Typically, the group targets iOS users and uses malicious ads to redirect them to fraudulent sites, where they try to steal financial information from victims. Typically, users were informed that they had won a gift card from a well-known brand.

Vulnerability in the WebKit engine

The new ScamClub operation, which started last summer, is based on the same principle, but this time the hackers exploited a vulnerability that allowed malicious code to escape the sandbox of an HTML iframe element. The root of the problem was how Webkit handles JavaScript event listeners. Since the bug was in the WebKit code, Apple Safari and Google Chrome for iOS were affected.

In the last 90 days alone, ScamClub has shown its malicious ads more than 50,000,000 times. Moreover, this is the basic level of activity, which is complemented by frequent surges – in one day the number of ad demonstrations can exceed 16,000,000.the experts write.

Although researchers notified Apple and Google of the issue last summer, the patch wasn’t released until December, and the fix only reached Safari for macOS and iOS this month.

Confiant specialists have published a list of domains where the ScamClub group hosted their fraudulent sites with fake gift cards, their addresses can be seen in the illustration below.

Vulnerability in the WebKit engine

Let me remind you that I wrote that for iOS was discovered a new exploit, with the help of which China traced the Uyghurs.

Vladimir Krasnogolovy

Vladimir is a technical specialist who loves giving qualified advices and tips on GridinSoft's products. He's available 24/7 to assist you in any question regarding internet security.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button