The threat actor known as TA569 has compromised the infrastructure of an undisclosed media company and is using this infrastructure to deploy the SocGholish JavaScript malware framework on the websites of hundreds of newspapers across the United States. While the exact number of compromised websites is unknown, more than 250 have been identified by Proofpoint and they noted that the attack has affected outlets based in New York, Boston, Chicago, Miami, and Washington D.C., among others. The media company in question is a firm that provides video content and advertising to major news outlets.
To carry out this campaign, TA569 injected malicious code into a benign JavaScript file that gets loaded by the compromised websites. This file was then used to install SocGholish, which infected those who visit the compromised websites with malware payloads camouflaged as fake browsers updates. These fake browser updates were delivered as ZIP archives in formats such as “Chrome.Update.zip” and “Firefox.Update.Zip” via fake alerts.
Similar campaigns using SocGholish have been seen from other threat actors in the past. For example, the Evil Corp cybercrime gang used SocGholish to infect over 30 U.S. private firms. This attack was also carried out through fake updates on compromised news websites with an end goal of ransomware deployment.