Hackers Using Disguised Google Ads To Inject Malware

Main Image
  • Like
  • Comment
  • Share

Google is the largest search engine with the most users on the face of this planet. Its ad platform dubbed Google Ads is used by advertisers worldwide to show ads on websites to market their products and services which is what makes it at the core of any business. However, cybercriminals are using the advent of Google Ads to inject malicious codes into clients’ devices.

According to the latest report by Guardio Labs, hackers are using the Google Ads platform to inject malware on affected devices. Dubbed the “MasquerAds”, hackers are targeting websites of organizations, crypto wallets, and GPUs among others.

How MasquerAds Work?

To expect in simple language, assume that you are a user searching for Grammarly. When you go to Google, you get the results along with Grammarly’s and like-services ads on the first page itself. Whenever you click on any link, you will go to their website or landing phase.

In the case of MasquerAds, the hackers (advertisers in this case) create clones of original websites like Grammarly, Thunderbird, Malwarebytes, MSI Afterburner, Dashlane, and Slack among others, and showcase an ad that runs on top of the page. Whenever an unsuspecting user clicks on these forged and duplicate ads, this triggers a series of actions where the hackers inject malware payload into the client’s device.

The report mentioned that there are multiple versions of malware such as IcedID malware loader, Vidar Stealer, and variants of Raccoon Stealer that are injected into the client’s device where the browser is not aware of it at all. The malware keeps a low profile without triggering any anti-virus programs whatsoever.

Google can block the campaign of these ads in case it detects that the said ad is packing in malware. These malware can do a lot including but not limited to stealing critical user data among others.

Note that devices with Ad Blockers installed on browsers reportedly get rid of such rogue and disguised links from search engineers.

Related Articles

ImageGoogle Pixel 7 Pro User Shares Frustrating Reality of Google Service Centers in India

The service experience at Google Pixel service centers in India can be mixed, as illustrated by a recent experience shared by a user-facing slow charging issues with his Google Pixel 7 Pro. This article delves into the specifics of his ordeal and the challenges encountered with the service center. The Service Center Saga The user’s journey (MohipGhosh1 …

ImageLeaked Android certificates left millions of smartphones vulnerable to malware

Looks like millions of Android smartphones were literally inches away from mass malware attacks. Devices from LG, Samsung and MediaTek chipsets were subjected to a major Android vulnerability. Once exploited, it would have given cyberattackers complete authority over your device. In fact, the privileges that this vulnerability introduces to the injected malware may be more …

ImageHow to find out if your phone is hacked? What to do if your phone is hacked?

Smartphones are an integral part of every other person in the current time. From emailing to watching videos, chatting, social media, gaming, finances, online shopping, and other crucial tasks are taken care of by a smartphone. Also, we save and exchange several personal data, IDs, banking cards, and concerned sensitive information on smartphones. And with …

ImageHow to Use Gemini in Google Messages

Google recently rolled out Gemini to all Android users running Android 12 and above. Gemini replaces your Google Assistant and provides you with generative AI text and images. Unfortunately, there is no way to use Gemini without setting it as your default assistant other than going to gemini.google.com. Now, Google has added another way to …

ImageNew malware uses cookies to break into Google Accounts

A new malware threat known as has emerged, posing a severe risk to Google account security. A report by BleepingComputer says, unlike traditional phishing scams or brute-force attacks, leverages a vulnerability in cookies, making it a more insidious threat.  This malware especially targets automatic login session cookies, collecting them from Chrome browsers and resurrecting them …

Discuss

Be the first to leave a comment.