Hackers Use Malicious Google Ads to Steal Users Microsoft Accounts

With Google's popularity, scammers are taking advantage of the company's services to commit malicious acts. Bad actors are pushing malicious ads onto Google's results pages, and while this tactic isn't new, this new method is aimed at stealing users' Microsoft login credentials.

Fake Microsoft Ads Stealing People's Accounts

In a report by Malwarebytes, the attack starts when someone searches for a Microsoft Ad program. Google serves up relevant sponsored links for the search term, and one of them is a fake copy of the Microsoft Ads site. It has a different URL than the real site, which is usually a giveaway.

Hackers Use Malicious Google Ads to Steal Users' Microsoft Accounts
An example of a fake Microsoft Ads site used as a sponsored link

However, people often trust Google's search results so much that they blindly click on the first result they see. And if the scammer is skilled enough, they can make their sponsored links look almost identical to the real ones, even if the URL looks strange.

The fake Microsoft Ads site has a number of measures in place to keep unwanted visitors out. For example, if a bot tries to parse the site or someone visits via VPN, the site will serve a fake landing page to distract them. And if you try to go directly to the URL without going through the fake ad, the site will instead show you a video of Rick Astley singing “Never Gonna Give You Up.”

However, if you access it through Google Ads, you'll see a fake Microsoft login page asking you to enter your username, password, and two-factor authentication code. If you provide this information, the scammer can use it to steal your Microsoft account.

Given the way the attack targets people who want to use Microsoft Ads to advertise their products, it's unlikely you'll see it. However, it's a good example of how these scams work, as they can impersonate almost any website.

Sign up and earn $1000 a day ⋙

Leave a Comment

Analyzing an Attack (Part 3)

Analyzing an Attack (Part 3)

In part 2 of this series, we have left all the necessary information required for an attack on the victim's network.

Microsoft 365 will disable ActiveX due to excessive hacker abuse

Microsoft 365 will disable ActiveX due to excessive hacker abuse

Microsoft Office has supported ActiveX for years as an option for document extensibility and automation, but it's also a serious security vulnerability.

Analyzing an Attack (Part 1)

Analyzing an Attack (Part 1)

This series will be based on a network vulnerability. What will be introduced in the article is already a real attack, starting from reconnaissance to enumeration, exploiting network services and ending with exploitation strategies sending notifications. All these steps will be observed at the data packet level, and then explained in detail.

A major cybersecurity company was just hacked and lost 440GB of data.

A major cybersecurity company was just hacked and lost 440GB of data.

The world-famous cybersecurity company Fortinet has just officially confirmed that a large amount of user data was stolen from the company's Microsoft Sharepoint server, and was posted on a hacker forum early in the morning of September 15.

New ransomware strain discovered that specializes in stealing login information from Chrome browser

New ransomware strain discovered that specializes in stealing login information from Chrome browser

A new strain of ransomware called Qilin has been discovered using a relatively sophisticated, highly customizable tactic to steal account login information stored in the Google Chrome browser.

Analyzing an Attack (Part 2)

Analyzing an Attack (Part 2)

We showed you in part one the information that can be observed while opening the packet sequence sent by Nmap. The sequence sent starts with an ICMP echo response to determine if the computer or network has been assigned an IP address.

How to regain access to hard drive, fix error of not being able to open hard drive

How to regain access to hard drive, fix error of not being able to open hard drive

In this article, we will guide you how to regain access to your hard drive when it fails. Let's follow along!

How to use dental floss

How to use dental floss

Dental floss is a common tool for cleaning teeth, however, not everyone knows how to use it properly. Below are instructions on how to use dental floss to clean teeth effectively.

How to gain muscle according to experts

How to gain muscle according to experts

Building muscle takes time and the right training, but its something anyone can do. Heres how to build muscle, according to experts.

The Best Diets for Heart Health

The Best Diets for Heart Health

In addition to regular exercise and not smoking, diet is one of the best ways to protect your heart. Here are the best diets for heart health.

How to cure insomnia for pregnant women in the last 3 months

How to cure insomnia for pregnant women in the last 3 months

The third trimester is often the most difficult time to sleep during pregnancy. Here are some ways to treat insomnia in the third trimester.

Scientifically Proven Ways to Automatically Burn Calories

Scientifically Proven Ways to Automatically Burn Calories

There are many ways to lose weight without changing anything in your diet. Here are some scientifically proven automatic weight loss or calorie-burning methods that anyone can use.

All about iOS 26

All about iOS 26

Apple has introduced iOS 26 – a major update with a brand new frosted glass design, smarter experiences, and improvements to familiar apps.

Yoga exercises to treat insomnia

Yoga exercises to treat insomnia

Yoga can provide many health benefits, including better sleep. Because yoga can be relaxing and restorative, its a great way to beat insomnia after a busy day.

What is the flower of the other shore? Meaning and legend of the flower of the other shore

What is the flower of the other shore? Meaning and legend of the flower of the other shore

The flower of the other shore is a unique flower, carrying many unique meanings. So what is the flower of the other shore, is the flower of the other shore real, what is the meaning and legend of the flower of the other shore?

Healthy snacks that help you lose weight

Healthy snacks that help you lose weight

Craving for snacks but afraid of gaining weight? Dont worry, lets explore together many types of weight loss snacks that are high in fiber, low in calories without making you try to starve yourself.

What to do when you have trouble sleeping?

What to do when you have trouble sleeping?

Prioritizing a consistent sleep schedule and evening routine can help improve the quality of your sleep. Heres what you need to know to stop tossing and turning at night.

How to add a printer to Windows 10

How to add a printer to Windows 10

Adding a printer to Windows 10 is simple, although the process for wired devices will be different than for wireless devices.

The most commonly deficient nutrients in the diet

The most commonly deficient nutrients in the diet

Diet is important to our health. Yet most of our meals are lacking in these six important nutrients.

How to get beautiful nails quickly

How to get beautiful nails quickly

You want to have a beautiful, shiny, healthy nail quickly. The simple tips for beautiful nails below will be useful for you.

The best laptops for students in 2025

The best laptops for students in 2025

Students need a specific type of laptop for their studies. It should not only be powerful enough to perform well in their chosen major, but also compact and light enough to carry around all day.