Cybercriminals are spreading malware using... Google Search

A new attack campaign that spreads malware through Google search results has been discovered by security experts from Palo Alto Networks.

Table of Contents

Hackers have been impersonating GlobalProtect VPN software, placing ads on Google Search to lure users to malicious websites, according to a report by Palo Alto Networks' Unit 42 cybersecurity department.

Cybercriminals are spreading malware using... Google Search
Malicious ads appear right on Google Search.

When users visit this website, they are tricked into downloading a malware downloader called WikiLoader, disguised as GlobalProtect software. WikiLoader then downloads other malicious code, which steals information and allows hackers to control the device remotely.

According to researchers, hackers' attack tactics have changed to expand the range of potential victims, from traditional phishing attacks to SEO (Search Engine Optimization).

WikiLoader has been active since late 2022. To bypass security measures, hackers have been constantly updating the malware.

Experts advise users to be cautious when downloading software from the Internet, especially from Google search results. Always double-check the source and authenticity of the website before downloading any files.

Warning: Scam to download fake Google Authenticator security app

The Department of Information Security - Ministry of Information and Communications warns users to be wary of scams that lure victims into downloading software containing malicious code through advertisements that encourage users to download the Google Authenticator application to increase security for personal devices in cyberspace.

Cybercriminals are spreading malware using... Google Search
Google Authenticator is a trusted multi-factor authentication application developed by Google.

Specifically, the scammers created websites with fake domain names, inserting sponsored ads so that when people look up information, the search results appear at the top of the page. To make users subjective and easily fall into the trap, these websites also contain fake Google certificates.

If users click on the above ads, they will be redirected to a fake Google website with the link "chromeweb-authenticators.com". When users click, the fake application will be automatically downloaded from the open source code hosting service Github, then attack the victim's devices, stealing important information and data.

The Department of Information Security - Ministry of Information and Communications recommends that people be vigilant when looking up and downloading security applications. You should only download applications from the Play Store (CH Play) system for Android operating systems and the App Store for iOS operating systems. Absolutely do not download applications from unknown sources or unofficial websites.

Warning: New Malware 'Mamont' Impersonates Google Chrome to Steal Information

Security researchers have recently discovered a new malware called 'Mamont', which can impersonate Google Chrome to trick people into stealing information.

Mamont hides itself by impersonating the popular Google Chrome web browser to steal information such as passwords, texts, photos and contacts from users. Experts say the malware currently targets only Russian speakers, but the threat actors behind 'Mamont' will quickly expand their targets.

Cybercriminals are spreading malware using... Google Search

Online fraud tactics using the 'Mamont' malware are becoming increasingly sophisticated. Fraudsters often use rented or purchased bank accounts to conduct suspicious transactions and launder money. They post information on forums and social networks about renting/buying accounts or approach low-income workers, students... to rent them to open bank accounts for prices ranging from 500,000 to 1 million VND per account.

This malware has the same icon as Chrome, which makes it easy for users to get confused and fall for it.

To avoid becoming a victim of personal information theft and malware, people should be cautious with strange links and not provide sensitive personal information such as citizen identification numbers, credit card numbers, bank account numbers, OTP codes, etc. In addition, users should absolutely not download software of unknown origin and should pay attention to the permissions that the application requires when installing.

Sign up and earn $1000 a day ⋙

Leave a Comment

How to know if a link is safe or not?

How to know if a link is safe or not?

Nowadays, malicious links appear more and more and are shared through social networks at a dizzying speed. Just clicking on a malicious link can bring potential dangers to you.

Scammers are spreading malware through... physical mail

Scammers are spreading malware through... physical mail

Some crafty scammers have figured out how to trick people into installing malicious apps that steal their banking details, and it all starts with a hand-delivered letter in the post.

New ransomware strain discovered that specializes in stealing login information from Chrome browser

New ransomware strain discovered that specializes in stealing login information from Chrome browser

A new strain of ransomware called Qilin has been discovered using a relatively sophisticated, highly customizable tactic to steal account login information stored in the Google Chrome browser.

Microsoft Outlook Contains a Critical Vulnerability That Could Easily Spread Malware

Microsoft Outlook Contains a Critical Vulnerability That Could Easily Spread Malware

Microsoft has just officially warned users about the existence of a vulnerability that could allow hackers to easily spread malware through the Outlook email application.

More than 200 apps containing malicious code were discovered and downloaded millions of times on the Google Play Store.

More than 200 apps containing malicious code were discovered and downloaded millions of times on the Google Play Store.

A cybersecurity firm has discovered a huge number of Android apps containing malicious code (adware), a discovery that also raises big questions about how Google monitors its online store.

Should You Use Public Wi-Fi in 2025?

Should You Use Public Wi-Fi in 2025?

Nowadays, free wifi networks are installed everywhere, from coffee shops, amusement parks, shopping malls, etc. This is very convenient for us users to be able to connect to the network everywhere to surf Facebook and work. However, is using free wifi safe?

How do criminals use CAPTCHAs to spread malware?

How do criminals use CAPTCHAs to spread malware?

Unfortunately, bad actors know this and have created fake CAPTCHAs that will infect your PC with malware.

Hackers Use Malicious Google Ads to Steal Users Microsoft Accounts

Hackers Use Malicious Google Ads to Steal Users Microsoft Accounts

There is a dangerous trend being deployed by the global hacker community, which is abusing the Google Ads platform to spread malicious code.

Stuxnet: The Worlds First Terrifying Digital Weapon

Stuxnet: The Worlds First Terrifying Digital Weapon

Stuxnet is a malicious computer worm that was first discovered in June 2010 after it paralyzed Iran's nuclear facilities. And to this day, Stuxnet is still a terrifying obsession for the global Internet.

Why is Infostealer malware the biggest new malware concern?

Why is Infostealer malware the biggest new malware concern?

Often distributed in a malware-as-a-service model, infostealer malware is often used to steal data, remaining hidden for as long as possible.

Modern malware has more sophisticated ways of hiding

Modern malware has more sophisticated ways of hiding

Why is new malware being developed to hide from users, and what does that say about the current cybercrime world?

How to Protect Yourself from the Latest WordPress Malware Attack

How to Protect Yourself from the Latest WordPress Malware Attack

As one of the most popular website building tools in the world, WordPress is once again a target for malware.

Nearly Half of Steam Gamers Still Use Windows 10

Nearly Half of Steam Gamers Still Use Windows 10

Even though Windows 10 will stop being supported after October 14, 2025, many Steam users are still using the operating system.

How to Find and Remove Keyloggers Completely from Your Computer

How to Find and Remove Keyloggers Completely from Your Computer

Keyloggers are extremely dangerous programs that hackers install on any user's system with the aim of stealing passwords, credit card information, etc. Keyloggers store all the keystrokes that users perform on the computer and provide hackers with important user information.

How to take a screenshot on Samsung Galaxy

How to take a screenshot on Samsung Galaxy

Taking screenshots on Samsung Galaxy phones is also extremely easy.

How to insert and remove watermark in Word document

How to insert and remove watermark in Word document

To insert or remove watermark on Word document, we can immediately use the available feature in this editing tool, with 2 different ways to insert watermark in the content.

What is the best AI photo background remover?

What is the best AI photo background remover?

People spend too much time manually removing backgrounds, and AI isn't always the magic it claims to be.

SpaceX launches first mobile satellite supporting direct connection to smartphones

SpaceX launches first mobile satellite supporting direct connection to smartphones

On January 3, Elon Musk's SpaceX launched the first six satellites that can provide mobile service to remote areas without the need for a terminal.

NVIDIA GeForce RTX 5060 Ti Officially Launched: Blackwell GB206 GPU, 20% More Performance Than RTX 4060 Ti And Twice As Fast When Using DLSS 4

NVIDIA GeForce RTX 5060 Ti Officially Launched: Blackwell GB206 GPU, 20% More Performance Than RTX 4060 Ti And Twice As Fast When Using DLSS 4

NVIDIA's next flagship graphics card, the GeForce RTX 5060 Ti, will come in 16GB and 8GB versions and is expected to launch in mid-April.

Cybercriminals are spreading malware using... Google Search

Cybercriminals are spreading malware using... Google Search

A new attack campaign that spreads malware through Google search results has been discovered by security experts from Palo Alto Networks.

Google adds feature to automatically open apps after installation on Play Store

Google adds feature to automatically open apps after installation on Play Store

Google is adding a small but long-awaited new feature to the Play Store.

High salary but no work required, how Tim Cook retains talent

High salary but no work required, how Tim Cook retains talent

After Tim Cook took over as CEO in 2011, in an effort to maintain public trust in Apple, he retained senior employees by paying them without requiring them to work.

Where to find Dead Pool area in Fortnite?

Where to find Dead Pool area in Fortnite?

Dead Pool is one of the Mortal Kombat-themed areas added to Fortnite since the v34.21 update.

Does the phone in airplane mode but still using wifi attract lightning?

Does the phone in airplane mode but still using wifi attract lightning?

Should you use your phone during a thunderstorm? Will your phone signal be hit by lightning? Will using wifi while your phone is in airplane mode attract lightning?

When did the first rain appear on Earth?

When did the first rain appear on Earth?

New research by a team of researchers from Australia and China suggests that the first rain appeared on Earth around 4 billion years ago, 500 million years earlier than previously thought.

The most dangerous thing in the world, just 5 minutes of contact can kill you

The most dangerous thing in the world, just 5 minutes of contact can kill you

This object is located in the Chernobyl area, Ukraine, as a result of one of the most terrifying radiation leaks in history. This object is shaped like a giant foot, so it is called the Elephant's Foot.

Latest Code of the Main Character Clash Clash

Latest Code of the Main Character Clash Clash

The game code Chu Cong Xung Xung Xung allows players to receive support when they first enter the game. These rewards will help you get acquainted with the game faster and will definitely attract new players. Enter the game code Chu Cong Xung Xung Xung below to receive gifts.

9 Best Local/Offline LLMs You Can Try Right Now

9 Best Local/Offline LLMs You Can Try Right Now

With quantum LLMs now available on HuggingFace and AI ecosystems like H20, Text Gen, and GPT4All allowing you to load LLM weights on your computer, you now have an option for free, flexible, and secure AI.

Reasons to Switch from Native Android Voice Recorder App to Dolby On

Reasons to Switch from Native Android Voice Recorder App to Dolby On

The default voice recorder on Android phones is flawed, lacking essential features like effective noise cancellation and powerful editing tools.