Tax-themed Google Ads push rogue ScreenConnect and a kernel-level EDR killer, Huntress warns


Cybercriminals are abusing Google Ads tied to tax-related searches to infect Windows PCs with a stealthy attack chain that ends in a kernel-level tool designed to kill security software, according to Huntress. The campaign has been active since at least January 2026 and targets people searching for W-2 and W-9 forms during tax season.

Huntress says the attackers used fake tax form pages and rogue ScreenConnect installers to gain remote access, then deployed a multi-stage payload that disabled products such as Microsoft Defender, Kaspersky, and SentinelOne. In Huntress’ view, the activity points to either ransomware staging or initial access brokerage, based on what the intruders did after getting in.

The lure works because it matches what victims already want. Someone searches for a tax form, clicks a sponsored result, lands on a convincing page, and downloads what looks like a normal file. Instead of getting only a document or form, they end up giving the attacker hands-on access to the machine. Huntress said it traced more than 60 rogue ScreenConnect sessions across its customer base that tied back to this campaign.

How the attack starts

According to Huntress, one observed chain began when a user searched for a W-2 tax form and clicked a sponsored Google result. That ad led through a redirect to a fake landing page serving a malicious MSI installer disguised as a tax-related file. The installer then deployed ScreenConnect, which gave the attacker remote control over the system.

FatMalloc’s 2GB memory allocation function (Source – Huntress)

That choice matters because ScreenConnect is a legitimate remote management tool. A victim may not question the install, and some security teams may not immediately treat it as malware. Huntress said the attackers even used trial cloud instances, which helped them blend in while keeping full keyboard-and-mouse access.

The campaign also did not stop at tax lures. Huntress found a fake Chrome update page in the same exposed infrastructure, with Russian-language JavaScript comments, suggesting the operator runs multiple social engineering fronts at once.

What happens after access

After ScreenConnect opened the door, the attacker deployed a crypter Huntress calls FatMalloc. Huntress said the tool allocates 2GB of memory and fills it before releasing it, a trick that can waste emulator time and cause weaker sandboxes to fail before they ever reach the real payload.

FatMalloc then uses the Windows multimedia timer API to trigger shellcode through a callback path rather than a more obvious thread creation method. Huntress said that approach can reduce visibility because execution appears to come through winmm.dll.

The shellcode address is passed as user data to timeSetEvent (Source – Huntress)

The final payload, called HwAudKiller by Huntress, drops a Huawei audio driver to disk and registers it as a kernel service. Because the driver carries a valid Huawei signature, Windows loads it, and the malware then uses it to terminate targeted security processes from kernel mode. Huntress said the tool loops through running processes and sends matching IDs to the driver, which then kills them with kernel privileges.

Why defenders should pay attention

This is not a simple fake-download scam. It combines malvertising, remote access, anti-analysis techniques, and bring-your-own-vulnerable-driver tactics in one chain. That makes it more dangerous than ordinary malware droppers and much harder to stop once the attacker gains access.

Huntress also described post-compromise behavior that looked consistent with pre-ransomware activity. In one intrusion, the attacker dumped LSASS credentials and used NetExec to harvest accounts across the network after blinding endpoint defenses.

Decompiled kill function (Source – Huntress)

Google’s own advertising rules state that malicious software is not allowed in ads or destinations linked from ads, and its misrepresentation policy bars deceptive destinations that mislead users. Even so, this campaign shows how attackers still slip harmful pages into sponsored search flows at exactly the moment users are most likely to trust the result.

What users should do right now

The safest move is simple. Do not download tax forms from ads or third-party sites.

The IRS publishes official pages for both W-2 and W-9 information, and taxpayers should use IRS pages directly when they need forms or instructions. IRS.gov also maintains a central forms and instructions hub for official downloads.

If a machine already installed a tax-related MSI from an ad, defenders should assume compromise until proven otherwise. Huntress recommends treating any unapproved ScreenConnect trial instance as suspicious, especially instance patterns tied to temporary relay infrastructure.

Key details at a glance

ItemFinding
Campaign themeTax-season searches for W-2 and W-9 forms
First observed activityAt least January 2026
Initial accessRogue ScreenConnect installer delivered through Google Ads flow
Main evasion stageFatMalloc anti-analysis crypter
Final payloadHwAudKiller
Driver abuseSigned Huawei audio driver used for BYOVD-style process killing
Security products targetedMicrosoft Defender, Kaspersky, SentinelOne
Likely follow-on activityCredential dumping and lateral account harvesting

Signs of compromise

  • ScreenConnect installed without IT approval
  • Tax-themed MSI files downloaded from sponsored search results
  • New kernel driver creation from temporary or unusual directories
  • Security tools suddenly stopping without a clear reason
  • Suspicious activity involving LSASS access or mass credential collection
  • Multiple relay or remote-management tools appearing on the same host

What security teams should prioritize

  • Block or strictly control remote management tools that users do not need
  • Alert on unexpected ScreenConnect deployments, especially trial instances
  • Watch for new kernel services and driver creation events
  • Investigate binaries launched from ScreenConnect working directories
  • Train users to avoid sponsored results for government forms and common downloads
  • Direct employees to official IRS pages instead of search ads for tax documents

FAQ

Is this a Google Ads problem or a tax form problem?

It starts with malicious ads tied to tax-form searches. The forms themselves are legitimate, but attackers used fake pages and ad redirects to abuse that demand.

Why use ScreenConnect instead of traditional malware first?

Because ScreenConnect is a legitimate remote access tool. That can make the first stage look less suspicious and gives the attacker immediate control over the device.

What makes this campaign more serious than a normal fake download?

Huntress said the chain ends with a kernel-level driver abuse technique that kills endpoint protection tools before the attacker moves deeper into the environment.

Where should people download W-2 and W-9 information from?

From official IRS pages and the IRS forms portal, not from sponsored search results or lookalike domains.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages