Malvertising: Hackers Exploit Ads on Search Engines to Deliver Malware

Instead of relying on conventional methods, hackers are now purchasing ad space on prominent search engines, particularly Google, to deceive users into unwittingly installing malware.

Advertisements

In a concerning development, cybercriminals are increasingly utilizing malicious advertising, or malvertising, to target unsuspecting users with malware. Despite prior warnings, users continue to fall victim to these attacks, emphasizing the need for enhanced caution when interacting with online ads.

Malvertising has gained popularity among hackers, surpassing the efficacy of traditional phishing attacks and malicious apps. Instead of relying on conventional methods, hackers are now purchasing ad space on prominent search engines, particularly Google, to deceive users into unwittingly installing malware.

One deceptive technique employed by hackers involves impersonating well-known brands. Reports indicate instances of hackers mimicking reputable names such as Amazon, USPS, CCleaner, Notepad++, Facebook, and Microsoft. Notably, Facebook and Microsoft have consistently been the most impersonated brands since 2020.

The latest tactic involves hackers posing as a widely used PC tool known as CPU-Z. This tool is commonly employed by PC enthusiasts and gamers to gather information about their processors, motherboards, RAM, and graphics cards. As reported by cybersecurity firm Malwarebytes, hackers are exploiting Google ads to target users searching for CPU-Z online.

Upon clicking on a malicious ad, users are directed to a fake download portal that appears legitimate at first glance. Instead of downloading CPU-Z, the site contains a digitally signed MSIX installer housing a malicious PowerShell script for a loader called FakeBat.

Malware loaders, such as FakeBat, are designed to infect computers with malicious software. Once installed, the loader downloads and installs the Redline stealer, capable of harvesting personal data, including browser history, passwords, credit card information, VPN credentials, system details, and cryptocurrency wallets.

What makes this campaign particularly sophisticated is its selective targeting. Not all users who click on these malicious ads are directed to the fake download portal. Some are redirected to what seems like a standard blog with various articles, indicating a dynamic and adaptive approach by the hackers.

For the average consumer, this presents a significant concern. As online ads are omnipresent, users must exercise caution to avoid falling victim to malvertising. Changing browsing habits, such as avoiding clicking on ads altogether and directly visiting a company’s website, can mitigate the risks. Additionally, using ad blockers and deploying reliable antivirus software are recommended measures to enhance online security.

The evolving tactics employed by hackers highlight the need for ongoing awareness and proactive cybersecurity measures. As malvertising gains traction due to its effectiveness, users must remain vigilant to protect their personal information and devices from the ever-evolving landscape of cyber threats.

Join 16 other subscribers

Advertisements

audible - now streaming: podcasts, originals, and more. Start your free trial.

Advertisements

Amazon business - everything you love about amazon. for work - learn more

Advertisement

Advertisements

Trending Topics

AI Business Consumer cyber-security cybersecurity Email Gaming Government Hacking Home Malware Mobile Open Source Phishing Privacy Scams security Shopping technology Vulnerabilities

More News

Podcast Corner

Cybersecurity Awesomeness Podcast – Episode 151 Cybersecurity Awesomeness Podcast

In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler offer a comprehensive recap of RSAC 2026, cutting  through the noise of 40,000 attendees to deliver critical takeaways from the industry’s "Super Bowl." While AI dominated nearly 80% of vendor booths, the hosts differentiate between "marketecture" and meaningful innovation. They emphasize that deploying agentic AI without robust Data Security Posture Management (DSPM) is a recipe for unmanaged data sprawl and "Shadow AI" risks, where sensitive proprietary information is accidentally leaked into public models.A significant portion of the discussion focuses on the maturation of identity management, noting a shift toward granular guardrails for AI agents to prevent overprivileged access. The duo also debunks the myth of AI as a headcount replacement for SOC analysts, highlighting its lack of "tribal knowledge" and innovative problem-solving. Beyond the AI hype, the conversation touches on the urgency of Post-Quantum Cryptography (PQC) and the evolving role of the CISO—transitioning from a "head nerd" to a strategic risk manager under new regulatory mandates. Ultimately, the episode serves as a reminder that foundational data governance remains the true anchor in a high-velocity threat landscape.

Leave a comment

Discover more from Cyber News Gator

Subscribe now to keep reading and get access to the full archive.

Continue reading