Cybercriminals spoof Brave browser website to push malware

Brave Browser
(Image credit: Shutterstock / bangoland)

Cybercriminals have been caught impersonating the website of the privacy-focused browser Brave in order to infect unsuspecting users with malware.

As reported by Ars Technica, the cybercriminals behind the attack first registered the domain xn--brav-yva[.]com which uses punycode to represent bravė[.]com. Besides the accent over the 'e', this site has a domain which appears quite similar to Brave's own website (brave[.]com).

Users who visited the fake site would have a difficult time differentiating between the two sites as the cybercriminals mimicked both the look and feel of Brave's legitimate website. The only real difference though is that when a user clicked on the “Download Brave” button, a malware known as both ArechClient and SectopRat would be downloaded instead of the browser.

In order to help drive traffic to their fake site, the cybercriminals then bought ads on Google that were shown when users searched for browsers. While the ads themselves didn't look dangerous, they came from the domain mckelveytees[.]com instead of from brave[.]com. Clicking on one of these ads would send users to several different domains before they eventually landed on bravė[.]com.

Punycode domains

According to Jonathan Sampson who works as a web developer at Brave, the fake sites prompted users to download a 303MB ISO image that contained a single executable.

While the malware pushed by bravė[.]com is known as both ArechClient and SectopRat, analysis from the cybersecurity firm G Data back in 2019 revealed that it was a remote access trojan (RAT) with the capability to stream a user's current desktop as well as to create a second invisible desktop that attackers could use. However, since it's release, the cybercriminals behind the malware have added new features including encrypted communications with C&C servers as well as the ability to steal a user's browser history from both Chrome and Firefox.

Head of threat intel research at the cybersecurity firm Silent Push, Martijin Gooten conducted his own investigation to see if the cybercriminals behind this campaign had registered other lookalike sites to launch further attacks. He then searched for other punycode domains registered through the domain registrar NameCheap to discover that fake sites had been registered for the Tor browser, Telegram and other popular services.

In order to avoid falling victim to this campaign and other similar attacks, users should carefully inspect the web addresses of all of the sites they visit in the address bar of their browsers. While this can be tedious, it's currently the only way to easily detect lookalike sites that can be used to spread malware and other viruses.

Via Ars Technica

TOPICS
Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Read more
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Mac users targeted with new malware, so be on your guard
Representational image of a cybercriminal
Criminals are spreading malware disguised as DeepSeek AI
Fraude en ligne phishing
Google Search ads are being hacked to steal account info
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
These fake macOS updates are actually just looking to spread malware
A finger touching the google chrome icon in the Windows 10 start menu
A new Chrome browser highjacking attack could affect billions of users - here's how to fight it
malware
Google warns of legit VPN apps being used to infect devices with malware
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
A Lego Pikachu tail next to a Pebble OS watch and a screenshot of Assassin's Creed Shadow
ICYMI: the week's 7 biggest tech stories from LG's excellent new OLED TV to our Assassin's Creed Shadow review
Samuel and Romy standing very close together in A24's Babygirl movie
Everything new on Max in April 2025, including A24's Babygirl and The Last of Us season 2
An AMD Radeon RX 9070 XT made by Sapphire on a table with its retail packaging
AMD’s secret weapon against Nvidia seems to be stock – way more RX 9070 GPUs are rumored to be hitting shelves than RTX 5000 models