{"id":25729,"date":"2025-01-30T08:10:08","date_gmt":"2025-01-30T16:10:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2025\/01\/30\/news-19452\/"},"modified":"2025-01-30T08:10:08","modified_gmt":"2025-01-30T16:10:08","slug":"news-19452","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2025\/01\/30\/news-19452\/","title":{"rendered":"Microsoft advertisers phished via malicious Google ads"},"content":{"rendered":"\n<p>Just days after we uncovered a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2025\/01\/the-great-google-ads-heist-criminals-ransack-advertiser-accounts-via-fake-google-ads\">campaign<\/a> targeting Google Ads accounts, a similar attack has surfaced, this time aimed at Microsoft advertisers. These malicious ads, appearing on Google Search, are designed to steal the login information of users trying to access Microsoft&#8217;s advertising platform.<\/p>\n<p>Microsoft does purchase ad space on its rival&#8217;s dominant search engine; however, we found Google sponsored results for &#8220;Microsoft Ads&#8221; (formerly known as Bing Ads) that contained malicious links created by impostors.<\/p>\n<p>Through shared artifacts, we were able to identify additional phishing infrastructure targeting Microsoft accounts going back to a couple of years at least. We have reported these incidents to Google.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-fake-microsoft-ads-caught-on-google-search\">Fake Microsoft Ads caught on Google Search<\/h2>\n<p>Microsoft made an <a href=\"https:\/\/backlinko.com\/bing-users\" target=\"_blank\" rel=\"noreferrer noopener\">estimated $12.2 billion<\/a> in search and news advertising revenues (including Bing) in 2023, which pales in comparison to its rival, Google, holding a much larger share of the search engine market.<\/p>\n<p>Since the advertising ecosystem allows for an open competition between brands, Microsoft is trying to get traffic and earn clicks from Google searches. During our investigation, we saw sponsored results for Microsoft Ads and Bing Ads that managed to slip through Google&#8217;s security checks:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_d1e94e.png\"><img decoding=\"async\" loading=\"lazy\" width=\"727\" height=\"341\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_d1e94e.png\" alt=\"Figure 1: A Google search for 'microsoft ads'\" class=\"wp-image-148312\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 1: A Google search for &#8216;microsoft ads&#8217;<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-redirection-cloaking-and-cloudflare\">Redirection, cloaking and Cloudflare<\/h2>\n<p>The threat actors are using different techniques to evade detection and drop traffic from bots, security scanners and crawlers. Unwanted IP addresses (<em>e.g.<\/em> VPNs) are immediately redirected to a bogus marketing website (<em>Figure 2<\/em>). This is also known as a &#8220;white page&#8221;, meaning it looks innocent and hides its maliciousness.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_5b8f26.png\"><img decoding=\"async\" loading=\"lazy\" width=\"892\" height=\"942\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_5b8f26.png\" alt=\"Figure 2: Cloaking page\" class=\"wp-image-148207\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 2: Cloaking page<\/figcaption><\/figure>\n<p>Users that appear to be genuine are presented with a Cloudflare challenge to verify they are human. This is a legitimate instance of Cloudflare, unlike the <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/12\/fix-it-social-engineering-scheme-impersonates-several-brands\">&#8220;ClickFix&#8221; type-of-attacks<\/a> that have become very common place and trick people into pasting and executing malicious code.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_afa5af.png\"><img decoding=\"async\" loading=\"lazy\" width=\"871\" height=\"533\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_afa5af.png\" alt=\"Figure 3: Cloudflare verification\" class=\"wp-image-148214\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 3: Cloudflare verification<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-rickroll-for-the-cheaters\">Rickroll for the cheaters<\/h2>\n<p>After a successful Cloudflare check, users are redirected to the final phishing page via a special URL, that acts as some sort of entry point for the malicious domain <em>ads[.]mcrosoftt[.]com<\/em>. You can see the network requests related to this redirection chain in <em>Figure 4<\/em> below.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_fadae1.png\"><img decoding=\"async\" loading=\"lazy\" width=\"738\" height=\"259\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_fadae1.png\" alt=\"Figure 4: Network traffic for full redirection\" class=\"wp-image-148221\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 4: Network traffic for full redirection<\/figcaption><\/figure>\n<p>If you were to visit that domain directly instead of going through the proper ad click you&#8217;d be greeted with a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Rickrolling\" target=\"_blank\" rel=\"noreferrer noopener\">rickroll<\/a>, an internet meme designed to make fun of someone. The sandbox for the web <a href=\"https:\/\/urlscan.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">urlscan.io<\/a> has several <a href=\"https:\/\/urlscan.io\/search\/#37.120.222.165\">exa<\/a><a href=\"https:\/\/urlscan.io\/search\/#37.120.222.165\" target=\"_blank\" rel=\"noreferrer noopener\">mples<\/a> of crawl requests for URLs on that server (<em>37.120.222[.]165<\/em>) that all went to the rickroll.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_15d4ce.png\"><img decoding=\"async\" loading=\"lazy\" width=\"681\" height=\"865\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_15d4ce.png\" alt=\"Figure 5: Rickroll redirect\" class=\"wp-image-148220\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 5: Rickroll redirect<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-phishing-page\">Phishing page<\/h2>\n<p>After much subversion, real victims finally see the phishing page for the Microsoft Advertising platform. The full URL in the address bar is meant to imitate the legitimate one (<em>ads.microsoft.com<\/em>).<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_d6853f.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1180\" height=\"934\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_d6853f.png?w=1024\" alt=\"Figure 6: Microsoft Advertising phishing page\" class=\"wp-image-148196\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 6: Microsoft Advertising phishing page<\/figcaption><\/figure>\n<p>The phishing page gives user a fake error message enticing them to reset their password and seemingly tries to get past 2-Step verification as well. Handling 2FA has become a standard feature in most phishing kits, due to the rise in user adoption of this additional security layer.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_66f74b.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1031\" height=\"880\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_66f74b.png?w=1024\" alt=\"Figure 7: Phishing steps\" class=\"wp-image-148227\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 7: Phishing steps<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-larger-campaign\">Larger campaign<\/h2>\n<p>Going back to <em>urlscanio<\/em>, we fed it the special entry URL and it was able to navigate to the <a href=\"https:\/\/urlscan.io\/result\/63f32ea8-74a3-4fc6-9414-80b5eace91c3\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing page<\/a>. From there, we can look at the various web requests and find something to pivot on in order to identify additional infrastructure.<\/p>\n<p>The <em>favicon.ico<\/em> file is one starting point and we can <a href=\"https:\/\/urlscan.io\/search\/#hash%3A2600793f03df90dbf991bba8718eb5a9703b28466a6fe011aed5c889a1104562%20AND%20NOT%20page.domain%3Aads.microsoft.com\" target=\"_blank\" rel=\"noreferrer noopener\">query<\/a> for any scans that match its hash, excluding the official Microsoft domain. The results show that in the past week, there were several other domains that appear to be related to the theft of Microsoft Ads accounts.<\/p>\n<p>But this campaign appears to go back further at least a couple of years and maybe more, although it becomes somewhat tricky to know if the malicious infrastructure is tied to the same threat actors. It&#8217;s worth noting that several of the domains are either hosted in Brazil or have the &#8216;<em>.com.br<\/em>&#8216; Brazilian top-level domain.<\/p>\n<p>What we discovered may only be the tip of the iceberg; by starting to investigate compromised advertiser accounts we may very well have opened Pandora&#8217;s box. This isn&#8217;t only Google or Microsoft ad accounts we are talking about, but potentially for Facebook, and many others. Of course, our scope so far has been Google Search, but we know that other platforms are rife with such phishing attacks.<\/p>\n<p>These recent malvertising campaigns highlight the ongoing threat of phishing through online advertising. While tech companies like Google work to combat these issues, users must remain vigilant. Here are some key steps you can take to protect yourself:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Verify URLs:<\/strong> Always carefully examine the URL in your browser&#8217;s address bar before entering any credentials. Scrutinize URLs for inconsistencies or misspellings.<\/li>\n<li><strong>Use 2-Step verification wisely:<\/strong> it adds an extra layer of security to your accounts, but you still need to pay attention to requests before granting them access.<\/li>\n<li><strong>Regularly monitor your accounts:<\/strong> Check your advertising accounts for any suspicious activity such as changes in administrator accounts.<\/li>\n<li><strong>Report Ads:<\/strong> If you encounter a suspicious ad, report it to for the benefit of other users.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we block them<\/strong><\/p>\n<p><em>Malwarebytes Browser Guard offers traditional ad-blocking augmented with advanced heuristic detection. <a href=\"https:\/\/www.malwarebytes.com\/browserguard\" target=\"_blank\" rel=\"noreferrer noopener\">Download it today<\/a>.<\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p>The following IOCs are comprised of domains that shared attributes with our initial phishing page, including the favicon and images. Some of them go back further but are provided for threat hunters who may wish to further investigate these campaigns.<\/p>\n<pre class=\"wp-block-preformatted\">30yp[.]com<br>aboutadvertselive[.]com<br>aboutblngmicro[.]cloud<br>account-microsoft[.]online<br>account-microsoft[.]site<br>account-mircrosoft-ads[.]com<br>account[.]colndcx-app[.]com<br>accounts-ads[.]site<br>accounts-mircrosoft-ads[.]online<br>acount-exchang[.]store<br>admicrosoft[.]com<br>admicrsdft[.]com<br>ads-adversitingb[.]com<br>ads-dsas[.]site<br>ads-microsoft[.]click<br>ads-microsoft[.]coachb-learning[.]com<br>ads-microsoft[.]live<br>ads-microsoft[.]lubrine[.]com[.]br<br>ads-microsoft[.]online<br>ads-microsoft[.]shop<br>ads-microsoftz[.]online<br>ads-miicrosoft[.]com<br>ads-mlcrosft[.]com<br>ads-mlcrosoft-com[.]blokchaln[.]com<br>ads[.]microsoft[.]com[.]euroinvest[.]ge<br>ads[.]mlcr0soft[.]com<br>ads[.]mlcrosoft[.]com[.]ciree[.]com[.]br<br>ads[.]mlcrosoft[.]com[.]poezija[.]com[.]hr<br>ads[.]rnlcrosoft[.]com[.]euroinvest[.]ge<br>adslbing[.]com<br>adsmicro[.]exchangefastex[.]cloud<br>adsmicrosoft[.]shop<br>adsverstoni[.]com<br>advertiseliveonline[.]com<br>advertising-bing[.]site<br>advertising-mlcrosoft[.]org<br>adverts2023[.]online<br>advertsingsinginbing[.]com<br>agency-wasabi[.]com<br>app[.]beefylswap[.]top<br>b\u00eelkub[.]com<br>bing-ads[.]com<br>bing[.]login-acount[.]me<br>bitmax-us[.]com<br>blngad[.]online<br>blseaccount[.]cloud<br>bltrue[.]colnhouse-fr[.]us<br>c\u00f4inl\u00edst[.]online<br>colneex-plalform[.]cloud<br>connec-exchan[.]site<br>digitechmedia[.]agency<br>forteautomobile[.]com<br>global-verifications[.]com<br>global-verify[.]com<br>homee-acount[.]com<br>itlinks[.]com[.]cn<br>krakeri-login[.]com<br>login-adsmicrosoft[.]helpexellent[.]com<br>login[.]adsadvertising[.]online<br>login[.]microsofttclicks[.]live<br>micrasofit[.]xyz<br>microosft[.]accounts-ads[.]site<br>microsoft-ads[.]website<br>microsoftadss[.]com<br>microsoftadversiting[.]cloud<br>microsoftbingads[.]com<br>microsofyt[.]adversing-publicidade[.]pro<br>mictrest[.]mnws[.]ru<br>mlcrosoft-bing-acces[.]click<br>mlcrosoftadvertlsing[.]online<br>mudinhox[.]site<br>ndnet[.]shop<br>phlyd[.]com<br>portfoliokrakenus[.]com<br>portfoliolkraken[.]com<br>portfoliopro-us[.]com<br>portfolioskranen[.]com<br>portofolioprospots[.]com<br>potfoliokeiolenen[.]com<br>potfoliokelaken[.]com<br>potfoliokelaneken[.]com<br>potfoliokenaiken[.]com<br>potfoliokenkren[.]com<br>potfolioketonelen[.]com<br>potfolioskaneken[.]com<br>potfolioskenaken[.]com<br>potfolioskraineken[.]com<br>potfolioskranaken[.]com<br>potfolioskraneken[.]com<br>pro-digitalus[.]com<br>prokrakenportfolio[.]com<br>rnlcrosoft[.]smartlabor[.]it<br>sig-in-mlcrosoft-advertisings[.]site<br>uiiadvertise[.]online<br>wvvw-microsoft[.]xyz<br>www-bingads[.]com<br>www-microsoftsads[.]com<br>www-v[.]userads[.]digital<br>www34[.]con-webs[.]com<br>www55[.]con-webs[.]com<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/cybercrime\/2025\/01\/microsoft-advertisers-phished-via-malicious-google-ads\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Just days after we uncovered a campaign targeting Google Ads accounts, a similar attack has surfaced, this time aimed at Microsoft&#8230; <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11147,13776,32357,4503,1670,32358,10531,10516,32359,3924],"class_list":["post-25729","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-advertising","tag-bing","tag-bing-ads","tag-cybercrime","tag-google","tag-malicious-ad","tag-malvertising","tag-microsoft","tag-microsoft-ads","tag-phishing"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25729"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25729\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}