Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Google Ads users targeted by ad fraud steal credentials and 2FA codes
Global Security

Google Ads users targeted by ad fraud steal credentials and 2FA codes

AdminBy AdminJanuary 15, 2025No Comments4 Mins Read
Fake Google Ads
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 15, 2025Ravi LakshmananMalware / Malware

Fake Google Ads

Cybersecurity researchers have warned of a new malicious ad campaign that targets individuals and businesses that advertise through Google Ads in an attempt to trick their credentials with fraudulent Google ads.

“The scheme is to steal as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages,” said Jerome Segura, senior director of threat intelligence at Malwarebytes. said in a report shared with The Hacker News.

It is believed that the ultimate goal of the campaign is to reuse the stolen credentials for further campaigns, as well as sell them to other criminals on underground forums. On the basis messages general on Reddit, Blueas well as Google support forumsthe threat has been in place since at least mid-November 2024.

Cyber ​​security

An activity cluster is similar in many ways to companies that use hijacking malware to steal data associated with Facebook ads and business accounts in order to hijack them and use the accounts to dislodge malicious companies that further distribute the malware.

The newly identified company specifically targets users who search for Google Ads in Google’s own search engine to serve up false ads for Google Ads that, when clicked, redirect users to fraudulent sites hosted on Google Sites.

These sites then serve as landing pages that direct visitors to external phishing sites that are designed to capture their credentials and two-factor authentication (2FA) codes via WebSocket and transfer them to a remote server controlled by the attacker.

“False ads for Google Ads originate from a variety of individuals and businesses (including a regional airport) in a variety of locations,” Segura said. “Some of these accounts already had hundreds of other legitimate ads running.”

Fake Google Ads

The genius aspect of the campaign is that it takes advantage of the fact that Google Ads does not require the final URL—the web page users are taken to when they click on the ad—must match the display URL as long as the domains match.

This allows threat actors to host their intermediate landing pages on sites.google(.)com while keeping their display URLs as ads.google(.)com. Moreover, the modus operandi involves the use of techniques such as fingerprinting, anti-bot traffic detection, CAPTCHA-based baiting, cloaking and obfuscation to hide the phishing infrastructure.

Malwarebytes said the collected credentials are then misused to log into the victim’s Google Ads account, add a new administrator, and use their budget to spend on fake Google ads.

In other words, threat actors hijack Google Ads accounts to promote their own ads and add new victims to the growing pool of compromised accounts used to further spread fraud.

“There appear to be several individuals or groups behind these companies,” Segura said. “Notably, most of them speak Portuguese and probably work from Brazil. The phishing infrastructure relies on intermediary domains with the .pt top-level domain (TLD), which indicates Portugal.”

Cyber ​​security

“This malicious advertising activity is not infringing Google Advertising Policy. Threat actors are allowed to display fake URLs in their ads, making them look indistinguishable from legitimate sites. Google has not yet indicated that it is taking definitive steps to freeze such accounts until their security is restored.”

The discovery comes after Trend Micro discovered that attackers are using platforms like YouTube and SoundCloud to spread links to fake installers of pirated versions of popular software, which eventually lead to the deployment of various malware families, such as Amadey, Lumma Stealer, Mars Stealer, Penguish , PrivateLoader and Vidar Stealer.

“Threat entities often use reputable file hosting services such as Mediafire and Mega.nz to hide the origin of their malware and make detection and removal more difficult,” the company said in a statement. said. “Many malicious downloads are password-protected and encrypted, making analysis in security environments such as sandboxes more difficult and allowing malware to escape early detection.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.