{"id":39397,"date":"2023-01-24T14:49:01","date_gmt":"2023-01-24T14:49:01","guid":{"rendered":"https:\/\/www.vmengine.net\/2023\/01\/24\/security-how-hackers-use-google-ads-to-deliver-malware\/"},"modified":"2025-05-23T17:34:37","modified_gmt":"2025-05-23T17:34:37","slug":"security-how-hackers-use-google-ads-to-deliver-malware","status":"publish","type":"post","link":"http:\/\/temp_new.vmenginelab.com\/en\/2023\/01\/24\/security-how-hackers-use-google-ads-to-deliver-malware\/","title":{"rendered":"Security: How hackers use Google Ads to deliver malware"},"content":{"rendered":"<div class=\"et_pb_section et_pb_section_455 et_section_regular\" >\n<div class=\"et_pb_row et_pb_row_553\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_559  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_2182  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>On the one hand, there is <strong>malware<\/strong>, i.e. <strong>software intentionally designed to cause disruptions to a computer, server, client or computer network, disclose private information<\/strong> and so on and so forth. On the other hand, there is <strong><br \/>\n  <a href=\"https:\/\/ads.google.com\/intl\/it_it\/home\/\">Google Ads<\/a><br \/>\n<\/strong>, the tool, made available by <a href=\"https:\/\/about.google\/\"><br \/>\n  <strong>Google<\/strong><br \/>\n<\/a>, to plan advertising campaigns on the network of Google&#8217;s partner sites or for campaigns on the search network. In the middle there are them, the <strong>hackers<\/strong>, who with their computer skills are able to break into and violate computer networks illegally, without any authorization.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_584 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2022\/03\/29\/cybersicurezza-e-cloud-computing-la-grande-sfida-del-nostro-tempo\/\" target=\"_blank\">Cybersecurity and Cloud Computing: The Great Challenge of Our Time<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_606 et_animated et-waypoint\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2023\/01\/google-ads-consulente-1-2.jpg\" alt=\"\" title=\"google-ads-consultant (1)\"  sizes=\"(max-width: 740px) 100vw, 740px\" class=\"wp-image-35759\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_2183  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><a href=\"https:\/\/guard.io\/\"><strong>Guardio Labs<\/strong><\/p>\n<p><\/a>&#8216; team of experts sheds light on how users are exposed to these websites, which are promoted to a wide audience by leveraging <strong><a href=\"https:\/\/ads.google.com\/intl\/it_it\/home\/\">Google Ads<\/a> advertising campaigns<\/strong>. These are <em>fake<\/em> sites shown among <a href=\"https:\/\/about.google\/\"><br \/>\n  <strong>Google&#8217;s<\/strong><br \/>\n<\/a> advertisements. Among the main products used for the campaign are:  <a href=\"https:\/\/www.grammarly.com\/\"><br \/>\n  <strong>Grammarly<\/strong><br \/>\n<\/a>,  <strong><br \/>\n  <a href=\"https:\/\/www.msi.com\/Landing\/afterburner\/graphics-cards\">MSI Afterburner<\/a><br \/>\n<\/strong>,  <strong><br \/>\n  <a href=\"https:\/\/slack.com\/intl\/it-it\/\">Slack<\/a><br \/>\n<\/strong>,  <strong><br \/>\n  <a href=\"https:\/\/www.dashlane.com\/it\">Dashlane<\/a><br \/>\n<\/strong>,  <a href=\"https:\/\/it.malwarebytes.com\/\"><br \/>\n  <strong>Malwarebytes<\/strong><br \/>\n<\/a>,  <a href=\"https:\/\/www.audacityteam.org\/download\/\"><br \/>\n  <strong>Audacity<\/strong><br \/>\n<\/a>,  <a href=\"https:\/\/www.utorrent.com\/intl\/it\/\"><br \/>\n  <strong>\u03bcTorrent<\/strong><br \/>\n<\/a>,  <strong><br \/>\n  <a href=\"https:\/\/obsproject.com\/\">OBS<\/a><br \/>\n<\/strong>,  <strong><br \/>\n  <a href=\"https:\/\/eu.ring.com\/\">Ring<\/a><br \/>\n<\/strong>,  <strong><br \/>\n  <a href=\"https:\/\/anydesk.com\/it\">AnyDesk<\/a><br \/>\n<\/strong>, <a href=\"Libre%20Office\"><br \/>\n  <strong>Libre Office<\/strong><br \/>\n<\/a>, <strong><br \/>\n  <a href=\"https:\/\/www.teamviewer.com\/it\/\">Teamviewer<\/a><br \/>\n<\/strong>, <a href=\"https:\/\/www.thunderbird.net\/it\/\"><br \/>\n  <strong>Thunderbird<\/strong><br \/>\n<\/a> , and <strong><br \/>\n  <a href=\"Good\">Brave<\/a><br \/>\n<\/strong>.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_2184  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>But <strong>how do these cybercriminals scam such a large number of users<\/strong>? The promoted sites are <strong>placed at the top of the results page<\/strong>, so users are led to think that everything is normal and that these sites are legitimate. When <strong>Google detects an infected site<\/strong>, the<strong> ads are immediately removed<\/strong>, but in this case, the cybercriminals were able to find a way to get past the checks. The trick is to go and create harmless sites that are highlighted when the user uses certain keywords. Legitimate software can be downloaded from this fake website, but the<a href=\"https:\/\/it.msi.com\/\"><strong> MSI<\/strong> <\/a>installer or <strong>ZIP archive<\/strong> contains malware as well. Among the most used are <strong>Raccoon<\/strong> and <strong>Vidar<\/strong>, which act by stealing numerous data from the computer and belong precisely to the category of<strong> info-stealers<\/strong>.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_585 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2022\/11\/18\/cloud-aws-ancora-leader-nel-quadrante-magico-di-gartner\/\" target=\"_blank\">Cloud, AWS still a leader in Gartner&amp;apos;s &quot;Magic Quadrant<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_607 et_animated et-waypoint\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2023\/01\/8-simple-google-ads-2.jpg\" alt=\"\" title=\"8-simple-google-ads\"  sizes=\"(max-width: 740px) 100vw, 740px\" class=\"wp-image-35761\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_cta_586 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2022\/12\/15\/aws-nello-spazio-cosi-raccogliamo-e-analizziamo-dati-in-orbita\/\" target=\"_blank\">AWS in space: how we collect and analyze data in orbit<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_2185  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Recapping. The stratagem therefore consists in bringing the user who clicks on the advertisement to a harmless site created ad hoc, which<strong> Guardio<\/strong> calls <strong>&#8220;masequerAd&#8221;,<\/strong> and then directing them back to a malicious site that impersonates the legitimate resource sought by the user.<br \/><em>&#8220;When these masquerAd sites are visited through the ad on the search engine <\/em>&#8211; explain the experts of Guardio &#8211;<em>  The server redirects visitors to the rogue site and from there to the malicious payload. These rogue sites are virtually invisible to visitors who don&#8217;t reach them via the promotional stream that exploits the masquerAd site by showing it as legitimate to crawlers, bots, casual visitors, and Google&#8217;s countermeasures.&#8221;<\/em>.<br \/>In short, a real unwelcome <em>&#8220;gift&#8221;.<\/em> Precisely for this reason, <strong>Guardio&#8217;s<\/strong> experts are keen to emphasize that <em>&#8220;security is a matter of trust, which is why it is important to turn to reliable and trusted suppliers for your daily activities on the web. This concept of masquerAD abuses the trust that we sometimes blindly grant to Google and its search results.&#8221;<\/em><\/p>\n<\/div><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Guardio Labs: &#8220;We need reliable and trusted suppliers for our daily activities on the web&#8221;<\/p>\n","protected":false},"author":6,"featured_media":35748,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,3574],"tags":[5074,4623,4918,4944,4919,4945,4154,4258,4286,4651],"class_list":["post-39397","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-in-evidence","tag-attacco-hacker-2","tag-attacco-malware","tag-google-ads","tag-google-ads-en","tag-hacker","tag-hacker-en","tag-hacker-attack","tag-malware","tag-malware-en","tag-malware-attack"],"aioseo_notices":[],"jetpack_featured_media_url":"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2023\/01\/google-ads-services-1.gif","amp_enabled":true,"_links":{"self":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/39397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/comments?post=39397"}],"version-history":[{"count":1,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/39397\/revisions"}],"predecessor-version":[{"id":41771,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/39397\/revisions\/41771"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media\/35748"}],"wp:attachment":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media?parent=39397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/categories?post=39397"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/tags?post=39397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}