Cybersecurity researchers are tracking an active and evolving campaign distributing a new malware loader named 'FakeBat'. The primary delivery mechanism for this threat is malvertising—malicious ads displayed in search engine results and on websites. These ads trick users into believing they are downloading popular business applications such as Slack, Zoom, and Notion. Instead, they download the FakeBat loader, which then infects the system and proceeds to deliver more dangerous secondary payloads. The campaign has been observed dropping well-known malware families, including the RedLine Stealer and various remote access trojans (RATs), making it a significant threat to both individuals and organizations.
The FakeBat campaign leverages the trust users have in popular software brands. The attack chain is as follows:
This method is effective because it preys on common user behavior and can bypass some security filters that focus on email-based threats.
FakeBat itself is primarily a loader, meaning its main purpose is to get other malware onto a system. It has been observed to be under continuous development, with attackers frequently changing its code and infrastructure to evade detection.
The payloads delivered by FakeBat are varied but often include:
T1189 - Drive-by Compromise: The core of the malvertising technique.T1204.002 - User Execution: Malicious File: The attack relies on the user being tricked into running the malicious installer.T1105 - Ingress Tool Transfer: FakeBat's primary function of downloading the next-stage payload.T1555 - Credentials from Password Stores: A key capability of the RedLine Stealer payload.A FakeBat infection can have severe consequences:
D3-DNSAL: DNS Allowlisting and D3-UA: URL Analysis can help prevent users from reaching malicious sites. This is supported by strong user training.Train users to be skeptical of search engine ads for software and to navigate directly to official vendor websites for downloads.
Use ad-blocking and DNS filtering technologies to prevent malicious ads and connections to malicious domains.
Mapped D3FEND Techniques:
Use application allowlisting to prevent the execution of unauthorized installers downloaded by users.
Mapped D3FEND Techniques:
The most direct way to break the FakeBat attack chain is to prevent the malicious ad from ever being displayed to the user. Organizations should deploy enterprise-grade ad-blocking solutions on all endpoints. These tools, often integrated into EDR or secure web gateway products, prevent browsers from rendering content from known advertising and malvertising networks. By blocking the initial ad, the user is never presented with the opportunity to click the malicious link, completely neutralizing this infection vector. This is a proactive control that is more effective than relying on users to spot a fake download page.
Since this attack relies on social engineering, user training is a critical mitigation. Security awareness programs must specifically address the dangers of downloading software from search engine ads. Users should be taught a simple, strict rule: 'To download software, always manually type the official website address (e.g., slack.com, zoom.us) into the browser. Never trust a sponsored ad link.' This training should be reinforced with periodic simulations and communications. While technical controls are essential, a well-informed user who is skeptical of advertised links is a powerful defense against malvertising campaigns like FakeBat.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats