Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Malvertising scam is using fake Google ads for the abduction accounts Microsoft
Global Security

Malvertising scam is using fake Google ads for the abduction accounts Microsoft

AdminBy AdminFebruary 1, 2025No Comments4 Mins Read
Malvertising Scam
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


01 February 2025Red LakshmananLittle / Mobile Safety

A fraud scam

Cybersecurity researchers have discovered a company aimed at Microsoft advertisers with Bogus Google Ads aimed at transferring them to phishing pages capable of collecting their powers.

“These malicious ads that appear in Google are designed to kidnap users entry to access Microsoft’s advertising platform,” Jérôme Segura, Senior Malware Director, – Note In the report on Thursday.

The conclusions came a few weeks after cybersecurity expose A similar company that used Google Sponsored Advertising to orientation to people and businesses through the search giant advertising platform.

The latest set of attacks is focused on users looking for terms such as “Microsoft ADS” in search of Google, hoping to deceive them, pressing the malicious links provided in the form of sponsored ads on the search results pages.

At the same time, the subjects behind the company use several methods to evade safety tools. This includes the redirection of traffic that comes from VPN on the fake marketing site. The site visitors also serve Cloudflare problems trying to filter the boots.

Cybersecurity

Last but not less important, users trying to visit the final target page (“ADS.MCROSOFTT (. rickrolled Reducing them in a video from YouTube related to the famous Internet meme.

The Phisching Page is a similar version of its legitimate analogue (“ADS.Microsoft (.) Com”) designed to capture the victim’s accounting data and two-factor authentication codes (2FA), giving the attackers the opportunity to hold their accounts.

Malwarebytes said it had revealed additional phishing -infrastructure aimed at Microsoft’s credentials, which have been coming up to several years, believing that the company has been going on for a while, and that it may also be aimed at other advertising platforms such as Meta.

Another characteristic aspect is that most phishing domains are either located in Brazil, or there is a Brazilian upper -level domain “. tld.

The Hacker News appealed to Google to comment.

Microsoft Advertising Accounts

Strike attacks are advocating USPS

The disclosure of information stems from the appearance of a phishing company SMS, which uses unsuccessful baits shipping packages to only focus on mobile users, pretending to be US (USPS) postal service.

“This company uses sophisticated social engineering tactics and have never seen burglary to provide malicious PDF files aimed at stealing and compromising sensitive data,” Zimperium Zlabs Artega Arteg – Note In a report published this week.

Messages call on the recipients open the cover file PDF to update your address to complete the delivery. The PDF document provides a “Press Update” button that sends the victim to the Phishing USPS web page where they are asked to enter your mailing address, email address and phone number.

The Phishing Page is also equipped to collect payment card data under the guise of the service for refurbishment. Then the entered data is encrypted and transmitted to a remote server under the control of the attacker. As much as how much 20 malicious PDF and 630 Phishing Pages were found within the campaign, which testifies to a large -scale operation.

“PDFs used in this company, built -in links to the standard /URI buttons, making it more complicated to extract the URL during the analysis,” the Ortega said. “This method allowed the famous malicious URL -url PDF files to bypass multiple definition decisions.”

Activities are a sign that cybercrime uses security gaps on mobile devices to pull out social engineering attacks that take advantage of users’ trust in popular brands and official communication.

Similar attacks with USPS topics also used the Apple IMESSAGE to provide phishing pages, technology that is known Throwing triad.

Cybersecurity

Such messages are also deftly trying to bypass the security measure in the IMessage, which does not allow the links if the message is not from the famous sender or from the account which user is in charge of. This is done by turning on “Please reply to Y” either “please respond to 1 message, trying to disable the built-in phishing-defense IMessage.

It is worth noting that this approach was previously associated with the specified set of phising tools as services (Phaas) Darkulaused for extensive focus on postal services such as USPS and other created organizations in more than 100 countries.

“The scammers built this attack relatively well, and so they are so often seen in the wild,” Kain’s hunt – Note. “Simple truth, it works.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.