A sophisticated campaign has been uncovered recently by cybersecurity researchers where hackers are exploiting Blogspot links to redirect unsuspecting users to malicious websites.
This technique, part of the broader “ApateWeb” campaign, demonstrates the evolving tactics employed by cybercriminals to evade detection and compromise user security.
The investigation began when researchers identified suspicious Blogspot links being shared on social media platforms.
These links appeared legitimate due to the use of social media meta tags, which created convincing link previews related to the topics of the posts they were attached to.
Upon closer examination, the researchers discovered that these Blogspot pages contained embedded JavaScript code designed to redirect visitors to malicious domains.
One such domain, altitudehighjackhonorary[.]com, was found to be a central hub for this redirection scheme.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
The redirection process involves multiple stages:-
These destinations included Windows phishing sites, fake VPN installers, and pages serving malware or potentially unwanted programs (PUPs).
To evade detection, the hackers employed several sophisticated techniques:-
The campaign’s infrastructure is extensive, with researchers identifying over 9,500 domains exhibiting similar redirection behavior over a 30-day period.
These domains were primarily hosted on IP ranges associated with AS 39572 (“ADVANCEDHOSTERS-AS”) and AS 7979 (“SERVERS-COM”).
Besides this, thousands of domains returning “empty OK” responses were discovered, many registered through URL Solutions, Inc.
These domains often served as sources for malicious JavaScript loaded by other compromised sites.
By leveraging trusted platforms like Blogspot and employing advanced evasion techniques, the attackers can bypass many traditional security measures.
To protect against such threats, users are advised to:-
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar