Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Jack Dorsey is working on the Bluetooth messaging app, Bitchat

The SEO addiction campaign targets over 8,500 SMB users with malware disguised as AI tools

Threads are approaching X’s daily app users, new data shows

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malvertising SCAM hijacks the Microsoft advertisement account using fake Google ads
Identity

Malvertising SCAM hijacks the Microsoft advertisement account using fake Google ads

userBy userFebruary 1, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringFebruary 1, 2025LingeringRavy LakshmananMalverTising / Mobile Security

Fraud

Cyber ​​-security researchers aim to use Microsoft Advertisers to use Bogus Google ads to discover the Malvertising campaign and move to a fishing page where you can harvest qualifications.

「Google Searchに掲載されているこれらの悪意のある広告は、Microsoftの広告プラットフォームにアクセスしようとするユーザーのログイン情報を盗むように設計されています」と、MalwareBytesの研究担当シニアディレクターであるJérômeSegura氏はI mentioned in the report on Thursday.

The survey results occurred a week after the Cyber ​​Security Company released a similar campaign with Google ads leveraged to target ads via a major search advertising platform.

The latest attack set targets users who search for terms such as “Microsoft ADS” in Google Search, and click on the search results page to a malicious link provided in the form of an advertisement with sponsor. Please decide.

At the same time, threats behind the campaign adopt some methods to avoid security tool detection. This includes traffic redirect from VPN. Site visitors will also provide cloud -free issues to exclude bots.

Cyber ​​security

Last but not least, users who try to access the final landing page directly (“Ads.mcrosoftt)[.]COM “) is re -rolled by redirecting them to the YouTube video linked to the famous Internetmome.

The phishing page is a version like a legitimate counter part (“Ads.microsoft)[.]com “) This is designed to capture the login qualification information of the victim and the two -factor authentication (2FA) code, which gives the attacker a function to hire an account.

According to MalwareBytes, the Microsoft account has been specified a few years ago, and the campaign has been ongoing for a while, and other advertising platforms such as META may be targeted. It suggests.

Another notable aspect is that most of the fishing domains are hosted in Brazil or have the top -level domain in Brazil, the campaign for Google ADS users. Is similar to. Pt “TLD.

Hacker news contacted Google for comments, but the company had previously taken measures to ban hacker news, taking measures to prohibit advertising to trick users with the goal of stealing information. He said he is actively working to enforce. Such an effort.

Microsoft Advertising Account

Smithing Atttack will be USPS

This disclosure is the appearance of an SMS fishing campaign that uses a failed package distribution lure to target a mobile device user to be a US postal service (USPS).

“This campaign is a sophisticated social engineering tactic and a remarkable means that is more noticeable, stealing qualifications and designed to compromise confidential data. I will provide “

The message encourages the recipient to open the PDF file, update the address, and complete the distribution. What exists in the PDF document is to enter a mail address, e -mail address, and phone number in the “click update” button that instruct the victim to the USPS fishing web page.

The phishing page is also equipped to capture the details of the payment card, pretending to be re -distribution service charges. The entered data is encrypted and sent to the remote server under the control of the attacker. As part of the campaign, the largest malicious PDF and 630 phishing pages have been detected, indicating large -scale operations.

“The PDF used in this campaign has become more difficult to embed a link that can be clicked without using the standard /URI tag and extract the URL during the analysis,” said ORTEGA. 。 “With this method, a known malicious URL in the PDF file has been able to bypass detection by several endpoint security solutions.”

The activity indicates that cyber criminals use the security gap of mobile devices to bring out social engineering attacks that utilize users’ trust in popular brands and official communication.

A similar USPS -themed smashing attack was distributed using Apple’s iMessage. This is a technology that is known to be adopted by Chinese threat actor, SMISHING TRIAD.

Cyber ​​security

Such messages skillfully try to prevent links from being able to click on links, unless the message is from a known sender or from an account that users reply. This is realized by including the message of “Please reply to Y” or “1” to turn off the incorporated phishing protection of IMESAGE.

It is noteworthy that this approach was previously associated with a phishing (Phaas) toolkit named Darcula. DARCULA is used to widely target postal services such as USPS and other established organizations in more than 100 countries.

“The scammers are building the attack relatively well, so it’s probably the reason why they are probably wild,” said Huntless researcher Truman Kane. “The simple truth is that it works.”

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThey died together on the same flight. These are some of their stories
Next Article The university will change the program name and review the title under Trump’s DEI order
user
  • Website

Related Posts

The SEO addiction campaign targets over 8,500 SMB users with malware disguised as AI tools

July 7, 2025

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

July 7, 2025

Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More

July 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Jack Dorsey is working on the Bluetooth messaging app, Bitchat

The SEO addiction campaign targets over 8,500 SMB users with malware disguised as AI tools

Threads are approaching X’s daily app users, new data shows

AI forces integration into the data industry, but that’s not the whole story

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.