Malvertising: Hackers Exploit Ads on Search Engines to Deliver Malware

Instead of relying on conventional methods, hackers are now purchasing ad space on prominent search engines, particularly Google, to deceive users into unwittingly installing malware.

Advertisements

In a concerning development, cybercriminals are increasingly utilizing malicious advertising, or malvertising, to target unsuspecting users with malware. Despite prior warnings, users continue to fall victim to these attacks, emphasizing the need for enhanced caution when interacting with online ads.

Malvertising has gained popularity among hackers, surpassing the efficacy of traditional phishing attacks and malicious apps. Instead of relying on conventional methods, hackers are now purchasing ad space on prominent search engines, particularly Google, to deceive users into unwittingly installing malware.

One deceptive technique employed by hackers involves impersonating well-known brands. Reports indicate instances of hackers mimicking reputable names such as Amazon, USPS, CCleaner, Notepad++, Facebook, and Microsoft. Notably, Facebook and Microsoft have consistently been the most impersonated brands since 2020.

The latest tactic involves hackers posing as a widely used PC tool known as CPU-Z. This tool is commonly employed by PC enthusiasts and gamers to gather information about their processors, motherboards, RAM, and graphics cards. As reported by cybersecurity firm Malwarebytes, hackers are exploiting Google ads to target users searching for CPU-Z online.

Upon clicking on a malicious ad, users are directed to a fake download portal that appears legitimate at first glance. Instead of downloading CPU-Z, the site contains a digitally signed MSIX installer housing a malicious PowerShell script for a loader called FakeBat.

Malware loaders, such as FakeBat, are designed to infect computers with malicious software. Once installed, the loader downloads and installs the Redline stealer, capable of harvesting personal data, including browser history, passwords, credit card information, VPN credentials, system details, and cryptocurrency wallets.

What makes this campaign particularly sophisticated is its selective targeting. Not all users who click on these malicious ads are directed to the fake download portal. Some are redirected to what seems like a standard blog with various articles, indicating a dynamic and adaptive approach by the hackers.

For the average consumer, this presents a significant concern. As online ads are omnipresent, users must exercise caution to avoid falling victim to malvertising. Changing browsing habits, such as avoiding clicking on ads altogether and directly visiting a company’s website, can mitigate the risks. Additionally, using ad blockers and deploying reliable antivirus software are recommended measures to enhance online security.

The evolving tactics employed by hackers highlight the need for ongoing awareness and proactive cybersecurity measures. As malvertising gains traction due to its effectiveness, users must remain vigilant to protect their personal information and devices from the ever-evolving landscape of cyber threats.

Join 16 other subscribers

Advertisements

audible - now streaming: podcasts, originals, and more. Start your free trial.

Advertisements

Amazon business - everything you love about amazon. for work - learn more

Advertisement

Advertisements

Trending Topics

AI Business Consumer cyber-security cybersecurity Email Gaming Government Hacking Home Malware Mobile Open Source Phishing Privacy Scams security Shopping technology Vulnerabilities

More News

Podcast Corner

Cybersecurity Awesomeness Podcast – Episode 154 Cybersecurity Awesomeness Podcast

In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the radical evolution of exploit triage following the RSAC 2026 conference. They highlight Anthropic’s "Mythos," a sophisticated red-teaming AI capable of autonomously discovering and chaining vulnerabilities without human oversight. Unlike traditional hacking methods that rely on static kits, modern AI toolkits can scan massive IP ranges for every vulnerability in history—essentially automating the "needle in a haystack" search for attackers. This shift is particularly dangerous for legacy environments—essentially creating "Terminator" moments for infrastructure—where Windows XP embedded is still found in modern EV chargers.Citing Shodan statistics, the hosts reveal the alarming presence of public-facing legacy systems: approximately 5,000 instances of Windows Vista/Server 2008, 2,000 Windows Server 2003 systems, and 4 public Windows XP servers running IIS. Steffen and Buckler conclude that we have entered an "AI arms race" where automated adversaries outpace manual defenses, making continuous scanning and robust cyber hygiene vital for survival.

Leave a comment

Discover more from Cyber News Gator

Subscribe now to keep reading and get access to the full archive.

Continue reading