Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malvertising Campaign Exploits Tax Season with EDR Attacks

Malvertising Campaign Exploits Tax Season with EDR Attacks

Posted on March 23, 2026 By CWS

As April approaches, Americans are increasingly focused on meeting tax deadlines, a fact not lost on cyber attackers. A sophisticated malvertising campaign has been exploiting this urgency since January 2026, using misleading Google Ads to lure victims into downloading harmful software that disables endpoint detection and response (EDR) systems.

Malicious Campaign Targets U.S. Tax Filers

This cyber campaign specifically targets users searching for tax forms like W-2 and W-9. By creating fake landing pages that imitate official IRS portals, the attackers aim to deceive employees, freelancers, and small business owners into downloading malicious software during the tax filing season.

The process begins when a potential victim searches for a tax form on Google. They are directed to a site named anukitax[.]com, which then redirects to bringetax[.]com. This page hosts a rogue ScreenConnect installer named form_w9.msi, disguising itself as a legitimate tax form.

How the Attack Unfolds

ScreenConnect is a legitimate remote management tool, which is why many users are unsuspecting when they install it. However, once installed, attackers gain complete access to the victim’s machine without any oversight from enterprise IT departments.

Huntress researchers identified this campaign through routine threat analysis, uncovering over 60 unauthorized ScreenConnect sessions. What appeared to be suspicious remote activity was revealed as a multi-layered operation that blindsides endpoint security systems, potentially leading to ransomware attacks or selling initial access to other cybercriminals.

Technical Aspects of the Attack

After gaining entry, attackers deploy a complex crypter known as FatMalloc and other backup tools like FleetDeck, ensuring persistence through multiple relay instances. The final payload, HwAudKiller, uses an undocumented Huawei audio driver to disable security software from the kernel level.

HwAudKiller operates by terminating key security processes, allowing attackers to extract credentials and execute network-wide attacks. The use of a valid digital signature for the driver ensures it runs without raising suspicion from the operating system.

Precautionary Measures and Recommendations

The exposed open directories of the threat actors also reveal additional tactics, such as fake Google Chrome update pages with Russian-language comments, hinting at a Russian-speaking developer. This indicates a well-organized operation employing multiple social engineering strategies.

Users are advised to download tax forms only from the official IRS website and treat sponsored search results with skepticism. IT teams should whitelist approved remote management tools and flag any unusual ScreenConnect activity. Monitoring for specific Sysmon events can help detect unauthorized kernel driver installations.

For more updates on cybersecurity threats, follow us on Google News, LinkedIn, and X, and consider setting CSN as a preferred source in Google.

Cyber Security News Tags:Cybersecurity, EDR attacks, endpoint security, Google Ads, Huntress, Malvertising, Phishing, Ransomware, ScreenConnect, tax season

Post navigation

Previous Post: MioLab Infostealer: Advanced Threat to macOS Users
Next Post: North Korean Hackers Exploit VS Code for New Malware

Related Posts

28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online 28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online Cyber Security News
Critical BeyondTrust Flaw Exploited by Hackers Critical BeyondTrust Flaw Exploited by Hackers Cyber Security News
MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction Cyber Security News
Top 50 Best Penetration Testing Companies Top 50 Best Penetration Testing Companies Cyber Security News
40,000+ Cyberattacks Targeting API Environments To Inject Malicious Code 40,000+ Cyberattacks Targeting API Environments To Inject Malicious Code Cyber Security News
MetaMask Phishing Scam Uses Fake Security Reports MetaMask Phishing Scam Uses Fake Security Reports Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SEO Campaign Disguises Apps to Spread AsyncRAT
  • North Korean Hackers Exploit VS Code for New Malware
  • Malvertising Campaign Exploits Tax Season with EDR Attacks
  • MioLab Infostealer: Advanced Threat to macOS Users
  • Trio-Tech Subsidiary Faces Ransomware Attack Impact

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SEO Campaign Disguises Apps to Spread AsyncRAT
  • North Korean Hackers Exploit VS Code for New Malware
  • Malvertising Campaign Exploits Tax Season with EDR Attacks
  • MioLab Infostealer: Advanced Threat to macOS Users
  • Trio-Tech Subsidiary Faces Ransomware Attack Impact

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark