Tag: google ads

Google ads push malicious CPU-Z app from fake Windows news site
News

Google ads push malicious CPU-Z app from fake Windows news site

A threat actor has been distributing a trojanized version of the CPU-Z tool to deliver the Redline information-stealing malware via Google Ads. The new campaign was discovered by Malwarebytes analysts, who believe it is part of the same operation that used Notepad++ malvertising to deliver malicious payloads. The malicious Google advertisement for the trojanized CPU-Z, a Windows tool for profiling computer hardware, is hosted on a cloned copy of the legitimate Windows news site WindowsReport. CPU-Z is a popular free utility that allows users to monitor various hardware components read more Google ads push malicious CPU-Z app from fake Windows news site. Get up to date on the latest cybersecurity news and enhance your knowledge of cybersecurity with our thorough coverage of the...
Malvertisers Using Google Ads to Target Users Searching for Popular Software
News

Malvertisers Using Google Ads to Target Users Searching for Popular Software

There are details available regarding a malicious campaign that uses Google Ads to spread next-stage payloads and send people looking for well-known software to fake landing pages. This behavior was found by Malwarebytes, which described it as "unique in its way to fingerprint users and distribute time-sensitive payloads." In order to deliver fake advertisements on the Google search results page that, when clicked, filter out bots and other unwanted IP addresses by displaying a spoof website, the attack targets visitors who are specifically looking for Notepad++ and PDF converters. If the threat actor thinks the visitor is interesting, it will send the victim to a spoof website that promotes the program while discreetly fingerprinting the system to find out if the request is comi...
Malicious Notepad++ Google ads evade detection for months
News

Malicious Notepad++ Google ads evade detection for months

A recent malvertising effort on Google Search uses sophisticated ways to avoid detection and analysis as it targets users who want to download the well-known Notepad++ word editor. Malicious actors have been exploiting Google Ads more frequently to advertise phony software websites that propagate malware through malvertising campaigns. The Notepad++ malvertising campaign has been active for a few months, but Malwarebytes, who first discovered it, claims that it has remained hidden for that entire period. Although the exact payload that was sent to the victims is unknown, Malwarebytes believes it was most likely Cobalt Strike read more Malicious Notepad++ Google ads evade detection for months. Stay informed with the best cybersecurity news and raise your cybersecurity awarenes...
Fake Cisco Webex Google Ads abuse tracking templates to push malware
News

Fake Cisco Webex Google Ads abuse tracking templates to push malware

Threat actors can construct convincing Webex software search ads that link users to websites that have the BatLoader malware by exploiting a flaw in Google Ads tracking templates. Worldwide enterprises and businesses utilize the video conferencing and contact center software package Webex, which is a component of Cisco's collaboration product line. According to Malwarebytes, the threat actors in the malvertising operation appear to be from Mexico, and it has been active in Google Search for a week. According to Malwarebytes, the top Google Search result for the phrase "webex" displays a malicious Google ad that pretends to be the genuine Webex download portal read more Fake Cisco Webex Google Ads abuse tracking templates to push malware. Stay informed with the best cybersecurity ...
SYS01 Stealer Targets Critical Infrastructure With Google Ads
Resources, Risk, Security

SYS01 Stealer Targets Critical Infrastructure With Google Ads

From November 2022, threat actors have infected the systems of key government infrastructure workers, manufacturing organisations, and other targets with the information thief known as SYS01. Security researchers at Morphisec discovered the new effort, which used false Facebook pages to advertise games, sexual content, and cracked software while luring Facebook business accounts with Google advertisements. The enticement then prompted the download of a malicious link. Arnold Osipov, a malware researcher at Morphisec, stated in a Tuesday advisory that the attack "is meant to steal sensitive information read more SYS01 Stealer Targets Critical Infrastructure With Google Ads. Stay informed with the best cybersecurity news and raise your cybersecurity awareness with our comprehensive...