{"id":25679,"date":"2025-01-15T06:10:05","date_gmt":"2025-01-15T14:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2025\/01\/15\/news-19402\/"},"modified":"2025-01-15T06:10:05","modified_gmt":"2025-01-15T14:10:05","slug":"news-19402","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2025\/01\/15\/news-19402\/","title":{"rendered":"The great Google Ads heist: criminals ransack advertiser accounts via fake Google ads"},"content":{"rendered":"<br \/>\n<h2 class=\"wp-block-heading\" id=\"contents\">Table of contents<\/h2>\n<ul class=\"has-medium-font-size wp-block-list\">\n<li><a href=\"#overview\">Overview<\/a><\/li>\n<li><a href=\"#impersonate-ads\">Criminals impersonate Google Ads<\/a><\/li>\n<li><a href=\"#google-sites\">Lures hosted on Google Sites<\/a><\/li>\n<li><a href=\"#phishing\">Phishing for Google account credentials<\/a><\/li>\n<li><a href=\"#victimology\">Victimology<\/a><\/li>\n<li><a href=\"#who\">Who is behind these campaigns?<\/a><\/li>\n<li><a href=\"#fuel\">Fuel for other malware and scam campaigns<\/a><\/li>\n<li><a href=\"#iocs\">Indicators of Compromise<\/a><\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"overview\">Overview<\/h2>\n<p>Online criminals are targeting individuals and businesses that advertise via Google Ads by phishing them for their credentials \u2014 ironically \u2014 via fraudulent Google ads.<\/p>\n<p>The scheme consists of stealing as many advertiser accounts as possible by impersonating Google Ads and redirecting victims to fake login pages. We believe their goal is to resell those accounts on blackhat forums, while also keeping some to themselves to perpetuate these campaigns.<\/p>\n<p>This is the most egregious malvertising operation we have ever tracked, getting to the core of Google&#8217;s business and likely affecting thousands of their customers worldwide. We have been reporting new incidents around the clock and yet keep identifying new ones, even at the time of publication.<\/p>\n<p>The following diagram illustrates at a high level the mechanism by which advertisers are getting fleeced:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_290a44.png\"><img decoding=\"async\" loading=\"lazy\" width=\"959\" height=\"441\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_290a44.png\" alt=\"Figure 1: Process flow for this Google Ads heist campaign\" class=\"wp-image-147449\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 1: Process flow for this Google Ads heist campaign<\/em><\/figcaption><\/figure>\n<p class=\"has-text-align-right\"><em><a href=\"#contents\">Back to top<\/a><\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"impersonate-ads\">Criminals impersonate Google Ads<\/h2>\n<p>Advertisers are constantly trying to outbid each other to reach potential customers by buying ad space on the world&#8217;s number one search engine. This earned Google a whopping <a href=\"https:\/\/www.theglobeandmail.com\/investing\/markets\/stocks\/BIDU\/pressreleases\/29200352\/how-much-does-google-make-in-ad-revenue\/\">$175 billion in search-based ad revenues in 2023<\/a>. Suffice to say, the budgets spent in advertising can be considerable and of interest to crooks for a number of reasons.<\/p>\n<p>We first started noticing suspicious activity related to Google accounts somewhat accidentally, and after a deeper look we were able to trace it back to malicious ads for&#8230; Google Ads itself! Very quickly we were overwhelmed by the onslaught of fraudulent &#8220;Sponsored&#8221; results, specifically designed to impersonate Google Ads, as can be seen in <em>Figure 2<\/em>:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_b6573b.png\"><img decoding=\"async\" loading=\"lazy\" width=\"708\" height=\"513\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_b6573b.png\" alt=\"Figure 2: A malicious ad masquerading as Google Ads\" class=\"wp-image-147455\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 2: A malicious ad masquerading as Google Ads<\/em><\/figcaption><\/figure>\n<p>While it is hard to believe such a thing could actually happen, the proof is there when you click on the 3-dot menu that shows more information about the advertiser. We have partially masked the victim&#8217;s name, but clearly it is not Google; they are just one of the many accounts that have already been compromised and abused to trick more users:<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_faf82f.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1203\" height=\"991\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_faf82f.png?w=1024\" alt=\"Figure 3: The advertiser behind this ad is not affiliated with Google at all\" class=\"wp-image-147465\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 3: The advertiser behind this ad is not affiliated with Google at all<\/em><\/figcaption><\/figure>\n<p>People who will see those ads are individuals or businesses that want to advertise on Google Search or already do. Indeed, we saw numerous ads specifically for each scenario, sign up or sign in, as seen in <em>Figure 4<\/em>:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_2e86de.png\"><img decoding=\"async\" loading=\"lazy\" width=\"744\" height=\"362\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_2e86de.png\" alt=\"Figure 4: Two ads for signing up and sign in to Google Ads respectively\" class=\"wp-image-147354\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 4: Two ads for signing up and sign in to Google Ads respectively<\/em><\/figcaption><\/figure>\n<p>The fake ads for Google Ads come from a variety of individuals and businesses, in various locations. Some of those hacked accounts already had hundreds of other legitimate ads running, and one of them was for a popular Taiwanese electronics company.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/?attachment_id=147518\"><img decoding=\"async\" loading=\"lazy\" width=\"2125\" height=\"1029\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_6a5b44.png?w=1024\" alt=\"Figure 5: Victim accounts spending their own budgets on fake Google Ads\" class=\"wp-image-147518\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 5: Victim accounts spending their own budgets on fake Google Ads<\/em><\/figcaption><\/figure>\n<p>To get an idea of the geographic scope of these campaigns, we performed the same Google search simultaneously from several different geolocations (using proxies). First, here&#8217;s the malicious ad from a U.S. IP address belonging to a business registered in Paraguay:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_c9ada3.png\"><img decoding=\"async\" loading=\"lazy\" width=\"860\" height=\"370\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_c9ada3.png\" alt=\"Figure 6: U.S.-based search showing fake Google ad\" class=\"wp-image-147439\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 6: U.S.-based search showing fake Google ad<\/em><\/figcaption><\/figure>\n<p>Now, here&#8217;s that same ad that appears on Google Search in several other countries:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_6bd40b.png\"><img decoding=\"async\" loading=\"lazy\" width=\"891\" height=\"932\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_6bd40b.png\" alt=\"Figure 7: The same ad found in different countries\" class=\"wp-image-147440\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 7: The same ad found in different countries<\/em><\/figcaption><\/figure>\n<p class=\"has-text-align-right\"><em><a href=\"#contents\">Back to top<\/a><\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"google-sites\">Lures hosted on Google Sites<\/h2>\n<p>Once victims click on those fraudulent ads, they are redirected to a page that looks like Google Ads&#8217; <a href=\"https:\/\/ads.google.com\/home\/\">home page<\/a>, but oddly enough, it us hosted on <a href=\"https:\/\/support.google.com\/a\/users\/answer\/9310491?hl=en\">Google Sites<\/a>. These pages act as a sort of gateway to external websites specifically designed to steal the usernames and passwords from the coveted advertisers&#8217; Google accounts.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_cb6099.png\"><img decoding=\"async\" loading=\"lazy\" width=\"696\" height=\"886\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_cb6099.png\" alt=\"Figure 8: A malicious Google Sites page impersonating Google Ads\" class=\"wp-image-147463\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 8: A malicious Google Sites page impersonating Google Ads<\/em><\/figcaption><\/figure>\n<p>There&#8217;s a good reason to use Google Sites, not only because it&#8217;s a free and a disposable commodity but also because it allows for complete impersonation. Indeed, you cannot show a URL in an ad unless your landing page (<a href=\"https:\/\/support.google.com\/google-ads\/answer\/6273460?hl=en&amp;sjid=9183253545593795730-NC&amp;visit_id=638720470011587867-532267869&amp;ref_topic=6273775&amp;rd=1\">final URL<\/a>) matches the same domain name. While that is a rule meant to protect abuse and impersonation, it is one that is very easy to get around.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_a11de7.png\"><img decoding=\"async\" loading=\"lazy\" width=\"734\" height=\"127\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_a11de7.png\" alt=\"Figure 9: The rule that stipulates display URLs and final URLs must have matching domains\" class=\"wp-image-147356\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 9: The rule that stipulates display URLs and final URLs must have matching domains<\/em><\/figcaption><\/figure>\n<p>Looking back at the ad and the Google Sites page, we see that this malicious ad does not strictly violate the rule since <em>sites<strong>.google.com<\/strong><\/em> uses the same root domains ads <em>ads<strong>.google.com<\/strong><\/em>. In other words, it is allowed to show this URL in the ad, therefore making it indistinguishable from the same ad put out by Google LLC..<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_aecc0e.png\"><img decoding=\"async\" loading=\"lazy\" width=\"707\" height=\"481\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_aecc0e.png\" alt=\"Figure 10: The malicious ad does not violate Google's rule on the use of the display URL\" class=\"wp-image-147469\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 10: The malicious ad does not violate Google&#8217;s rule on the use of the display URL<\/em><\/figcaption><\/figure>\n<p class=\"has-text-align-right\"><em><a href=\"#contents\">Back to top<\/a><\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"phishing\">Phishing for Google account credentials<\/h2>\n<p>After the victims click on the &#8220;Start now&#8221; button found on the Google Sites page, they are redirected to a different site which contains a phishing kit. JavaScript code fingerprints users while they go through each step to ensure all important data is being surreptitiously collected.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_baa2d6.png\"><img decoding=\"async\" loading=\"lazy\" width=\"686\" height=\"881\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_baa2d6.png\" alt=\"Figure 11: The actual phishing page that follows\" class=\"wp-image-147475\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 12: The actual phishing page that follows<\/em><\/figcaption><\/figure>\n<p>Finally, all the data is combined with the username and password and sent to the remote server via a POST request. We see that criminals even receive the victim&#8217;s geolocation, down to the city and internet service provider.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_ea8b00.png\"><img decoding=\"async\" loading=\"lazy\" width=\"687\" height=\"1109\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_ea8b00.png?w=634\" alt=\"\" class=\"wp-image-147595\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 12: POST web request with victim&#8217;s details<\/em><\/figcaption><\/figure>\n<p class=\"has-text-align-right\"><em><a href=\"#contents\">Back to top<\/a><\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"victimology\">Victimology<\/h2>\n<p>There are multiple online reports of people who saw the fake Google Ads and shared their experiences:<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/support.google.com\/google-ads\/thread\/313042073\/help-with-removing-a-dangerous-scam-in-google-ads?hl=en\">Help with removing a dangerous scam in Google Ads<\/a> (<em>Google Ads Help forum<\/em>)<\/li>\n<li><a href=\"https:\/\/www.reddit.com\/r\/Google_Ads\/comments\/1hxy8ib\/google_ads_phishing_scam\/\">Google Ads Phishing Scam <\/a>(<em>Reddit<\/em>)<\/li>\n<li><a href=\"https:\/\/www.reddit.com\/r\/phishing\/comments\/1gt0rfd\/its_just_me_or_google_just_sponsored_a_link_to_a\/\">It&#8217;s just me or Google just sponsored a link to a phising site for Google ads?<\/a> (<em>Reddit<\/em>)<\/li>\n<li><a href=\"https:\/\/www.reddit.com\/r\/google\/comments\/1hl2e28\/be_aware_of_fake_google_page_clicked_by_accident\/\">Be aware of fake google page, clicked by accident<\/a> (<em>Reddit<\/em>)<\/li>\n<li><a href=\"https:\/\/bsky.app\/profile\/curiousjfu.bsky.social\/post\/3lfemjggs222m\">Warning! First sponsorized google answer for &#8220;Google ads&#8221; is a phishing attempt !<\/a> (<em>BlueSky<\/em>)<\/li>\n<\/ul>\n<p>We were able to get in touch with a couple of victims who not only saw the ads but were actually scammed and lost money. Thanks to their testimony and our own research, we have a better idea of the criminals&#8217; modus operandi:<\/p>\n<ul class=\"wp-block-list\">\n<li>Victim enters their Google account information into phishing page<\/li>\n<li>Phishing kit collects unique identifier, cookies, credentials<\/li>\n<li>Victim may receive an email indicating a login from an unusual location (Brazil)<\/li>\n<li>If the victim fails to stop this attempt, a new administrator is added to the Google Ads account via a different Gmail address<\/li>\n<li>Threat actor goes on a spending spree, locks out victim if they can<\/li>\n<\/ul>\n<p class=\"has-text-align-right\"><em><a href=\"#contents\">Back to top<\/a><\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"who\">Who is behind these campaigns?<\/h2>\n<p>We identified two main groups of criminals running this scheme but the more prolific by far is one made of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Brazilian_Portuguese\">Portuguese<\/a> speakers likely operating out of Brazil. Victims have also shared that they had received a notification from Google indicating suspicious logins from Brazil. Unfortunately, those notifications often came too late or where dismissed as legitimate, and the criminals already had time to do some damage.<\/p>\n<p>We should also note a third campaign that is very different from the other two, and where the threat actors&#8217; main goal is to distribute malware. The Google Ads phishing scheme may have been a temporary run which was not their main focus.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-brazilian-team\">Brazilian team<\/h3>\n<p>In the span of a few days, we reported over 50 fraudulent ads to the Google Ad team all coming from this Brazilian group. We quickly realized that no matter how many reported incidents and takedowns, the threat actors managed to keep at least one malicious ad 24\/7.<\/p>\n<p><em>Figure 13<\/em> shows the network traffic resulting from a click on the ad. You will see multiple hops before finally arriving to the phishing portal. The second URL shows the crooks are using a paid service to detect fake traffic.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_ddb2cc.png\"><img decoding=\"async\" loading=\"lazy\" width=\"832\" height=\"349\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_ddb2cc.png\" alt=\"\" class=\"wp-image-147641\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 13: Network traffic from the &#8216;Brazilian campaign&#8217;<\/figcaption><\/figure>\n<p>Within the JavaScript code part of the phishing kit, there are comments in Portuguese. <em>Figure 14<\/em> shows a portion of the code that does browser fingerprinting, which is a way of identifying users. Browser language, system CPU, memory, screen-width, and time zone are some of the data points collected and then hashed.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_a3017d.png\"><img decoding=\"async\" loading=\"lazy\" width=\"729\" height=\"813\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_a3017d.png\" alt=\"\" class=\"wp-image-147640\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 14: Identifying users via various settings<\/figcaption><\/figure>\n<h3 class=\"wp-block-heading\" id=\"h-asian-team\">Asian team<\/h3>\n<p>The second group is using advertiser accounts from Hong Kong and appears to be Asia-based, perhaps from China. Interestingly, they also use the same kind of delivery chain by leveraging Google sites. However, their phishing kit is entirely different from their Brazilian counterparts.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_807f00.png\"><img decoding=\"async\" loading=\"lazy\" width=\"833\" height=\"292\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_807f00.png\" alt=\"\" class=\"wp-image-147643\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 15: Web traffic for the &#8216;Chinese campaign&#8217;<\/figcaption><\/figure>\n<p><em>Figure 16<\/em> below shows a code extract with comments in Chinese, as well as a function called <em>xianshi<\/em>, which could be in reference to a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Liu_Xianshi\">Chinese general<\/a> of the late Qing dynasty or even a superhero from more modern gaming and <a href=\"https:\/\/www.amazon.com\/Xianshi-Inn-%E4%BB%99%E5%B8%88%E9%A9%BF%E7%AB%99-Egao-Chan-ebook\/dp\/B09VBBCJKB\">literature<\/a>.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_87ee9b.png\"><img decoding=\"async\" loading=\"lazy\" width=\"686\" height=\"548\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_87ee9b.png\" alt=\"\" class=\"wp-image-147634\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 16: Code with comments in Chinese<\/figcaption><\/figure>\n<h3 class=\"wp-block-heading\" id=\"h-third-campaign-possibly-eastern-european\">Third campaign (possibly Eastern European)<\/h3>\n<p>We observed another campaign which has a very different modus operandi. Google Sites is not involved at all, and instead they rely on a fake CAPTCHA lure and heavy obfuscation of the phishing page.<\/p>\n<p>Interestingly, the malicious ad we found was for Google Authenticator, despite the obvious ads-goo[.]click domain name. However, for about day or so, the redirect from that domain lead directly to a phishing portal hosted at <em>ads-overview[.]com<\/em>.<\/p>\n<p>The reason why we suggest the threat actors may be Eastern Europeans here is because of the type of redirects and obfuscation. There is also a distant feel of &#8216;software download via Google ads&#8217; we have reported on previously (see <em><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/07\/threat-actor-impersonates-google-via-fake-ad-for-authenticator\">Threat actor impersonates Google via fake ad for Authenticator<\/a><\/em>).<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_ebf79e.png\"><img decoding=\"async\" loading=\"lazy\" width=\"664\" height=\"871\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_ebf79e.png\" alt=\"\" class=\"wp-image-147671\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 17: A malicious ad for Google Authenticator and fake CAPTCHA<\/figcaption><\/figure>\n<p>A PHP script (<em>cloch.php<\/em>) then determines if the visitor is genuine or not (likely doing a server-side IP check). VPNs, bot and detection tools will get a &#8220;white&#8221; page showing some bogus instructions on how to run a Google Ads campaign. Victims are instead redirected to <em>ads-overview[.]com<\/em> which is a phishing portal for Google accounts.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_06fde4.png\"><img decoding=\"async\" loading=\"lazy\" width=\"888\" height=\"969\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_06fde4.png\" alt=\"\" class=\"wp-image-147696\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 18: Cloaking in action with a &#8216;white&#8217; page or the phishing page<\/figcaption><\/figure>\n<p>When we checked back on this campaign a few days later, we saw that the ad URL now redirected to a fake Google Authenticator site, likely to download malware. The redirection mechanism is shown in <em>Figure <\/em>20:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_7d0edc.png\"><img decoding=\"async\" loading=\"lazy\" width=\"699\" height=\"255\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_7d0edc.png\" alt=\"\" class=\"wp-image-147672\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 19: Web traffic for fake Google Authenticator site<\/figcaption><\/figure>\n<p class=\"has-text-align-right\"><em><a href=\"#contents\">Back to top<\/a><\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"fuel\">Fuel for other malware and scam campaigns<\/h2>\n<p>Stolen Google Ads accounts are a valuable commodity among thieves. As we have detailed it many times on this blog, there are constant malvertising campaigns leveraging compromised advertiser accounts to buy ads that push scams or deliver malware.<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/scams\/2024\/11\/printer-problems-beware-the-bogus-help\">Printer problems? Beware the bogus help<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/12\/malicious-ad-distributes-socgholish-malware-to-kaiser-permanente-employees\">Malicious ad distributes SocGholish malware to Kaiser Permanente employees<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/11\/hello-again-fakebat-popular-loader-returns-after-months-long-hiatus\">Hello again, FakeBat: popular loader returns after months-long hiatus<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/10\/large-scale-google-ads-campaign-targets-utility-software\">Large scale Google Ads campaign targets utility software<\/a><\/li>\n<\/ul>\n<p>If you think about it for a second, crooks are using someone else&#8217;s budget to further continue spreading malfeasance. Whether those dollars are spent towards legitimate ads or malicious ones, Google still earns revenues from those ad campaigns. The losers are the hacked advertisers and innocent victims that are getting phished.<\/p>\n<p>As result, taking action on compromised ad accounts plays a key part in driving down malvertising attacks. Google has yet to show that it takes definitive steps to freeze such accounts until their security is restored, despite their own <a href=\"https:\/\/support.google.com\/adspolicy\/answer\/6020955?sjid=7373673383981288695-NC\">policy<\/a> on the subject (<em>Figure 20<\/em>). For example, we recently saw a case where <a href=\"https:\/\/www.malwarebytes.com\/blog\/scams\/2024\/12\/repeat-offenders-drive-bulk-of-tech-support-scams-via-google-ads\">the same advertiser that had already been reported 30 times<\/a>, was still active.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_faae66.png\"><img decoding=\"async\" loading=\"lazy\" width=\"737\" height=\"294\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_faae66.png\" alt=\"Figure 20: Google's policy regarding violations\" class=\"wp-image-147520\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Figure 20: Google&#8217;s policy regarding violations<\/em><\/figcaption><\/figure>\n<p>As the scourge of fraudulent ads continues, we urge users to pay particular attention to sponsored results. Ironically, it&#8217;s quite possible that individuals and businesses that run ad campaigns are not using an ad-blocker (to see their ads and those from their competitors), making them even more susceptible to fall for these phishing schemes.<\/p>\n<p><strong>We don\u2019t just report on threats\u2014we block them<\/strong><\/p>\n<p><em>Cybersecurity risks should never spread beyond a headline. Keep threats off by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/browserguard\" target=\"_blank\" rel=\"noreferrer noopener\">downloading Malwarebytes Browser Guard today<\/a>.<\/em><\/p>\n<p class=\"has-text-align-right\"><em><a href=\"#contents\">Back to top<\/a><\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"iocs\">Indicators of Compromise<\/h2>\n<p>Fake Google Sites pages<\/p>\n<pre class=\"wp-block-preformatted\">sites[.]google[.]com\/view\/ads-goo-vgsgoldx<br>sites[.]google[.]com\/view\/ads-word-cmdw<br>sites[.]google[.]com\/view\/ads-word-makt<br>sites[.]google[.]com\/view\/ads-word-whishw<br>sites[.]google[.]com\/view\/ads-word-wwesw<br>sites[.]google[.]com\/view\/ads-word-xvgt<br>sites[.]google[.]com\/view\/ads3dfod6hbadvhj678<br>sites[.]google[.]com\/view\/aluado01<br>sites[.]google[.]com\/view\/ap-rei-pandas<br>sites[.]google[.]com\/view\/appsd-adsd<br>sites[.]google[.]com\/view\/asd-app-goo<br>sites[.]google[.]com\/view\/connectsing\/addss<br>sites[.]google[.]com\/view\/connectsingyn\/ads<br>sites[.]google[.]com\/view\/entteraccess<br>sites[.]google[.]com\/view\/exercitododeusvivo<br>sites[.]google[.]com\/view\/fjads<br>sites[.]google[.]com\/view\/goitkm\/google-ads<br>sites[.]google[.]com\/view\/hdgstt<br>sites[.]google[.]com\/view\/helpp2k<br>sites[.]google[.]com\/view\/hereon\/1sku4yf<br>sites[.]google[.]com\/view\/hgvfvd<br>sites[.]google[.]com\/view\/joaope-defeijao<br>sites[.]google[.]com\/view\/jthsjd<br>sites[.]google[.]com\/view\/logincosturms\/ads<br>sites[.]google[.]com\/view\/logins-words-officails<br>sites[.]google[.]com\/view\/logins-words-officsdp<br>sites[.]google[.]com\/view\/marchatrasdemarcha<br>sites[.]google[.]com\/view\/newmanage\/page<br>sites[.]google[.]com\/view\/one-vegas<br>sites[.]google[.]com\/view\/one-vegasw<br>sites[.]google[.]com\/view\/onvg-ads-word<br>sites[.]google[.]com\/view\/oversmart\/new<br>sites[.]google[.]com\/view\/pandareidel<br>sites[.]google[.]com\/view\/polajdasod6hbad<br>sites[.]google[.]com\/view\/ppo-ads<br>sites[.]google[.]com\/view\/quadrilhadohomemtanacasakaraio<br>sites[.]google[.]com\/view\/ricobemnovinhos<br>sites[.]google[.]com\/view\/s-ad-offica<br>sites[.]google[.]com\/view\/s-wppa<br>sites[.]google[.]com\/view\/sdawjj<br>sites[.]google[.]com\/view\/semcao<br>sites[.]google[.]com\/view\/sites-gb<br>sites[.]google[.]com\/view\/so-ad-reisd<br>sites[.]google[.]com\/view\/spiupiupp-go<br>sites[.]google[.]com\/view\/start-smarts<br>sites[.]google[.]com\/view\/start-smarts\/homepage\/<br>sites[.]google[.]com\/view\/umcincosetequebratudo<br>sites[.]google[.]com\/view\/vewsconnect<br>sites[.]google[.]com\/view\/vinteequatroporquarenta<br>sites[.]google[.]com\/view\/xvs-wods-ace<br>sites[.]google[.]com\/view\/zeroumnaoezerodois<br>sites[.]google[.]com\/view\/zeroumonlinecomosmp<\/pre>\n<p>Phishing domains<\/p>\n<pre class=\"wp-block-preformatted\">account-costumers[.]site<br>account-worda-ads[.]benephica[.]com<br>account-worda-ads[.]cacaobliss[.]pt<br>account[.]universitas-studio[.]es<br>accounts-ads[.]site<br>accounts[.]google[.]lt1l[.]com<br>accounts[.]goosggles[.]com<br>accounts[.]lichseagame[.]com<br>accousnt-ads[.]tmcampos[.]pt<br>accousnt[.]benephica[.]pt<br>accousnt[.]hyluxcase[.]me<br>ads-goo[.]click<br>ads-goog[.]link<br>ads-google[.]io-es[.]com<br>ads-overview[.]com<br>ads1.google.lt1l.com<br>ads1[.]google[.]veef8f[.]com<br>adsettings[.]site<br>adsg00gle-v3[.]vercel[.]app<br>adsgsetups[.]shop<br>advertsing-acess[.]site<br>advertsing-v3[.]site<br>as[.]vn-login[.]shop<br>benephica[.]pt<br>cacaobliss[.]pt<br>colegiopergaminho[.]pt<br>docs-pr[.]top<br>tmcampos[.]pt<br>vietnamworks[.]vn-login[.]shop<\/pre>\n<p class=\"has-text-align-right\"><em><a href=\"#contents\">Back to top<\/a><\/em><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/cybercrime\/2025\/01\/the-great-google-ads-heist-criminals-ransack-advertiser-accounts-via-fake-google-ads\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> An ongoing malvertising campaign steals Google advertiser accounts via fraudulent ads for Google Ads itself. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,1670,32311,10529,10531,3924],"class_list":["post-25679","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-google","tag-google-accounts","tag-google-ads","tag-malvertising","tag-phishing"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25679"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25679\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25679"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}