Hackers use Google Ads to spread malware in sneaky scheme

April 2, 2024
1 min read

TLDR:

  • Google Ads tracking feature exploited by hackers to deliver malware disguised as popular groupware installers.
  • Malicious ads redirect clickers to download harmful files from compromised domains, injecting malware into legitimate Windows files.

In a recent discovery, AhnLab Security Intelligence Center (ASEC) found that hackers are using the Google Ads Tracking feature to distribute malware disguised as popular groupware installers like Notion and Slack. By abusing the tracking feature, hackers redirect clickers to download harmful files from compromised domains, injecting the Rhadamanthys infostealer malware into legitimate Windows files like dialer.exe, openwith.exe, dllhost.exe, and rundll32.exe.

The malicious ad example shows a tracking URL hidden from users, redirecting them to a concealed tracking template URL rather than the displayed final URL. The final landing page mimics legitimate groupware sites, tricking visitors into downloading and running the malware, completing a multi-stage infection process.

Users are advised to carefully verify URLs when accessing sites and not trust the advertised banner URL. This case confirms that attackers exploit Google Ads and other search engine ad tracking to distribute malware, posing a significant threat to cybersecurity.

Latest from Blog

Cyber insurance changes shape of security for good and bad

TLDR: Key Points: Cyber-insurance landscape is shifting to encourage greater cyber resiliency Rising costs of cyberattacks are prompting insurers to re-examine underwriting How Cyber-Insurance Shifts Affect the Security Landscape The article discusses