'FakeBat' Malware Loader Uses Malvertising to Distribute RedLine Stealer and Other Payloads

'FakeBat' Malware Loader Spreads Through Malicious Ads Impersonating Popular Software

HIGH
March 12, 2026
4m read
MalwarePhishing

Related Entities

Products & Tech

SlackZoomNotion

Other

Full Report

Executive Summary

Cybersecurity researchers are tracking an active and evolving campaign distributing a new malware loader named 'FakeBat'. The primary delivery mechanism for this threat is malvertising—malicious ads displayed in search engine results and on websites. These ads trick users into believing they are downloading popular business applications such as Slack, Zoom, and Notion. Instead, they download the FakeBat loader, which then infects the system and proceeds to deliver more dangerous secondary payloads. The campaign has been observed dropping well-known malware families, including the RedLine Stealer and various remote access trojans (RATs), making it a significant threat to both individuals and organizations.


Threat Overview

The FakeBat campaign leverages the trust users have in popular software brands. The attack chain is as follows:

  1. Malvertising: Attackers place ads on search engines and websites that appear to be for legitimate software like 'Slack Download' or 'Notion for Desktop'.
  2. Redirection: When a user clicks the ad, they are redirected through a series of domains before landing on a malicious website that closely mimics the real software download page.
  3. Initial Download: The user, believing they are on the correct site, clicks the download button and receives a malicious installer, which contains the FakeBat loader.
  4. Execution and Payload Delivery: Once executed, FakeBat establishes persistence and communicates with a command-and-control (C2) server to receive its next-stage payload. This can be an information stealer, a RAT, or other malware.

This method is effective because it preys on common user behavior and can bypass some security filters that focus on email-based threats.

Technical Analysis

FakeBat itself is primarily a loader, meaning its main purpose is to get other malware onto a system. It has been observed to be under continuous development, with attackers frequently changing its code and infrastructure to evade detection.

The payloads delivered by FakeBat are varied but often include:

  • Information Stealers: RedLine Stealer is a common payload. It is designed to harvest a wide range of data from the victim's machine, including saved browser passwords, credit card numbers, cryptocurrency wallet data, and system information.
  • Remote Access Trojans (RATs): These give the attacker full, interactive control over the compromised machine, allowing them to spy on the user, access files, and use the machine as a pivot point for further attacks.

MITRE ATT&CK TTPs:

Impact Assessment

A FakeBat infection can have severe consequences:

  • Credential Theft: The theft of saved browser and application passwords can lead to the compromise of numerous online accounts, including corporate email, banking, and social media.
  • Financial Loss: Stolen credit card information can be used for fraudulent purchases. Compromise of cryptocurrency wallets can lead to direct financial theft.
  • Corporate Espionage: If a corporate user is infected, the attackers can steal sensitive business documents, intellectual property, and internal credentials.
  • Further Compromise: A RAT payload can allow attackers to deploy ransomware or use the victim's machine in other malicious activities.

Detection & Response

  • Network Monitoring: Monitor outbound network traffic for connections to known malicious C2 domains and IPs associated with FakeBat and RedLine Stealer. Threat intelligence feeds can provide this information.
  • Endpoint Detection: EDR solutions can detect the execution of the FakeBat loader and its subsequent actions, such as process injection or the creation of suspicious scheduled tasks for persistence.
  • DNS Filtering: Use a DNS security service to block resolution of the malicious domains used in the redirection chain and for C2 communication.

Mitigation

  1. User Education: This is the most critical defense. Train users to be extremely cautious when downloading software. They should be instructed to always go directly to the official vendor website by typing the URL into their browser, rather than clicking on search engine ads.
  2. Ad Blockers: Deploying reputable ad-blocking technology across the organization can prevent the malicious ads from being displayed to users in the first place, effectively breaking the start of the attack chain.
  3. Application Allowlisting: In high-security environments, use application allowlisting to prevent the execution of any unauthorized software, including the FakeBat installer.
  4. Restrict Local Admin Rights: Removing local administrator rights from standard users can limit the malware's ability to install itself deeply into the system and establish persistence.

Timeline of Events

1
March 12, 2026
This article was published

MITRE ATT&CK Mitigations

Train users to be skeptical of search engine ads for software and to navigate directly to official vendor websites for downloads.

Use ad-blocking and DNS filtering technologies to prevent malicious ads and connections to malicious domains.

Mapped D3FEND Techniques:

Use application allowlisting to prevent the execution of unauthorized installers downloaded by users.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The most direct way to break the FakeBat attack chain is to prevent the malicious ad from ever being displayed to the user. Organizations should deploy enterprise-grade ad-blocking solutions on all endpoints. These tools, often integrated into EDR or secure web gateway products, prevent browsers from rendering content from known advertising and malvertising networks. By blocking the initial ad, the user is never presented with the opportunity to click the malicious link, completely neutralizing this infection vector. This is a proactive control that is more effective than relying on users to spot a fake download page.

Since this attack relies on social engineering, user training is a critical mitigation. Security awareness programs must specifically address the dangers of downloading software from search engine ads. Users should be taught a simple, strict rule: 'To download software, always manually type the official website address (e.g., slack.com, zoom.us) into the browser. Never trust a sponsored ad link.' This training should be reinforced with periodic simulations and communications. While technical controls are essential, a well-informed user who is skeptical of advertised links is a powerful defense against malvertising campaigns like FakeBat.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

FakeBatMalvertisingRedLine StealerMalwareInfo-stealerSlackZoom

📢 Share This Article

Help others stay informed about cybersecurity threats