Post

ChrimeraWire Trojan Fakes Chrome Activity to Manipulate Search Rankings

A new trojan identified as ChrimeraWire is actively manipulating search engine rankings for both Google and Bing by simulating legitimate user activity through a hidden instance of the Google Chrome browser. Detailed by researchers at Doctor Web, this malware deviates from typical threats like data theft or encryption, instead focusing on boosting the visibility of specific websites by automating searches, loading target sites, and executing clicks. ChrimeraWire operates Chrome in debug mode from a hidden window, effectively mimicking genuine engagement to influence search algorithms.

The infection process for ChrimeraWire is layered and complex, not arriving directly but dropped as a final-stage payload through two distinct chains. The first chain involves an initial downloader that checks for virtual environments, subsequently downloading a Python-based script and a malicious DLL. This chain leverages a known Windows DLL search order hijack for privilege escalation and ultimately uses a signed OneDrive utility to load another malicious DLL, leading to ChrimeraWire’s installation. The second chain employs a downloader that mimics a legitimate Windows process and patches a system library to execute its payload. It exploits older COM interface vulnerabilities to gain administrator rights before triggering the final payload via scheduled tasks and DLL hijacking.

Once established, ChrimeraWire proceeds to download a specific Chrome build from a third-party site and installs browser extensions designed to bypass CAPTCHA protections. It then connects to a command-and-control server over WebSocket, receiving encrypted instructions that dictate search queries, target websites, click frequencies, and wait times between actions. The malware employs sophisticated evasion techniques, including “probabilistic” click patterns, random pauses, and shuffled link orders, to appear as authentic user behavior and circumvent bot mitigation systems, making it highly effective at generating artificial traffic that search engines may interpret as genuine.

Currently, the primary objective of ChrimeraWire appears to be driving fake traffic for shady affiliate marketing schemes or SEO manipulation. However, its infrastructure suggests broader capabilities. Doctor Web researchers note that ChrimeraWire also supports functions like reading page content, taking screenshots, and filling out web forms, although these features are not yet fully utilized. This indicates a potential for future expansion into more extensive automation or data scraping operations, posing an evolving threat to web integrity and potentially enabling more sophisticated information-gathering campaigns.

To read the complete article see: ChrimeraWire Trojan Fakes Chrome Activity to Manipulate Search Rankings

This post is licensed under CC BY 4.0 by the author.