Malvertising: Hackers Exploit Ads on Search Engines to Deliver Malware

Instead of relying on conventional methods, hackers are now purchasing ad space on prominent search engines, particularly Google, to deceive users into unwittingly installing malware.

Advertisements

In a concerning development, cybercriminals are increasingly utilizing malicious advertising, or malvertising, to target unsuspecting users with malware. Despite prior warnings, users continue to fall victim to these attacks, emphasizing the need for enhanced caution when interacting with online ads.

Malvertising has gained popularity among hackers, surpassing the efficacy of traditional phishing attacks and malicious apps. Instead of relying on conventional methods, hackers are now purchasing ad space on prominent search engines, particularly Google, to deceive users into unwittingly installing malware.

One deceptive technique employed by hackers involves impersonating well-known brands. Reports indicate instances of hackers mimicking reputable names such as Amazon, USPS, CCleaner, Notepad++, Facebook, and Microsoft. Notably, Facebook and Microsoft have consistently been the most impersonated brands since 2020.

The latest tactic involves hackers posing as a widely used PC tool known as CPU-Z. This tool is commonly employed by PC enthusiasts and gamers to gather information about their processors, motherboards, RAM, and graphics cards. As reported by cybersecurity firm Malwarebytes, hackers are exploiting Google ads to target users searching for CPU-Z online.

Upon clicking on a malicious ad, users are directed to a fake download portal that appears legitimate at first glance. Instead of downloading CPU-Z, the site contains a digitally signed MSIX installer housing a malicious PowerShell script for a loader called FakeBat.

Malware loaders, such as FakeBat, are designed to infect computers with malicious software. Once installed, the loader downloads and installs the Redline stealer, capable of harvesting personal data, including browser history, passwords, credit card information, VPN credentials, system details, and cryptocurrency wallets.

What makes this campaign particularly sophisticated is its selective targeting. Not all users who click on these malicious ads are directed to the fake download portal. Some are redirected to what seems like a standard blog with various articles, indicating a dynamic and adaptive approach by the hackers.

For the average consumer, this presents a significant concern. As online ads are omnipresent, users must exercise caution to avoid falling victim to malvertising. Changing browsing habits, such as avoiding clicking on ads altogether and directly visiting a company’s website, can mitigate the risks. Additionally, using ad blockers and deploying reliable antivirus software are recommended measures to enhance online security.

The evolving tactics employed by hackers highlight the need for ongoing awareness and proactive cybersecurity measures. As malvertising gains traction due to its effectiveness, users must remain vigilant to protect their personal information and devices from the ever-evolving landscape of cyber threats.

Join 16 other subscribers

Advertisements

audible - now streaming: podcasts, originals, and more. Start your free trial.

Advertisements

Amazon business - everything you love about amazon. for work - learn more

Advertisement

Advertisements

Trending Topics

AI Business Consumer cyber-security cybersecurity Email Gaming Government Hacking Home Malware Mobile Open Source Phishing Privacy Scams security Shopping technology Vulnerabilities

More News

Podcast Corner

Cybersecurity Awesomeness Podcast – Episode 149 Cybersecurity Awesomeness Podcast

In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for the RSA Conference (RSAC), often described as the "Super Bowl" of cybersecurity by talking about the EMA Vendor Vision report. To help attendees navigate the overwhelming presence of over 600 exhibitors, the hosts break down EMA’s "Vendor Vision" report, which spotlights ten essential innovators. The discussion covers a broad technological spectrum, ranging from Straker’s cutting-edge adversarial AI in the Early Stage Expo to Sky High Security’s leadership in Data Security Posture Management (DSPM).Key highlights include AWS’s unified cloud security suite, Acalvio's deception technologies, F5’s API-driven AI protections, and the evolving identity landscape spearheaded by Yubico and SailPoint. The hosts also examine the maturation of Privileged Access Management through Delinea and Keeper Security, alongside Proofpoint’s focus on human-centric vulnerabilities and business email compromise. By filtering the noise of the Moscone Center, this episode provides a strategic roadmap for identifying the technical trends that will define the industry for the coming months. It serves as an indispensable guide for anyone looking to maximize their impact and insight during the conference.

Leave a comment

Discover more from Cyber News Gator

Subscribe now to keep reading and get access to the full archive.

Continue reading