Hackers Use Malicious Google Ads to Steal Users Microsoft Accounts

With Google's popularity, scammers are taking advantage of the company's services to commit malicious acts. Bad actors are pushing malicious ads onto Google's results pages, and while this tactic isn't new, this new method is aimed at stealing users' Microsoft login credentials.

Fake Microsoft Ads Stealing People's Accounts

In a report by Malwarebytes, the attack starts when someone searches for a Microsoft Ad program. Google serves up relevant sponsored links for the search term, and one of them is a fake copy of the Microsoft Ads site. It has a different URL than the real site, which is usually a giveaway.

Hackers Use Malicious Google Ads to Steal Users' Microsoft Accounts
An example of a fake Microsoft Ads site used as a sponsored link

However, people often trust Google's search results so much that they blindly click on the first result they see. And if the scammer is skilled enough, they can make their sponsored links look almost identical to the real ones, even if the URL looks strange.

The fake Microsoft Ads site has a number of measures in place to keep unwanted visitors out. For example, if a bot tries to parse the site or someone visits via VPN, the site will serve a fake landing page to distract them. And if you try to go directly to the URL without going through the fake ad, the site will instead show you a video of Rick Astley singing “Never Gonna Give You Up.”

However, if you access it through Google Ads, you'll see a fake Microsoft login page asking you to enter your username, password, and two-factor authentication code. If you provide this information, the scammer can use it to steal your Microsoft account.

Given the way the attack targets people who want to use Microsoft Ads to advertise their products, it's unlikely you'll see it. However, it's a good example of how these scams work, as they can impersonate almost any website.

Sign up and earn $1000 a day ⋙

Leave a Comment

Analyzing an Attack (Part 3)

Analyzing an Attack (Part 3)

In part 2 of this series, we have left all the necessary information required for an attack on the victim's network.

Microsoft 365 will disable ActiveX due to excessive hacker abuse

Microsoft 365 will disable ActiveX due to excessive hacker abuse

Microsoft Office has supported ActiveX for years as an option for document extensibility and automation, but it's also a serious security vulnerability.

Analyzing an Attack (Part 1)

Analyzing an Attack (Part 1)

This series will be based on a network vulnerability. What will be introduced in the article is already a real attack, starting from reconnaissance to enumeration, exploiting network services and ending with exploitation strategies sending notifications. All these steps will be observed at the data packet level, and then explained in detail.

A major cybersecurity company was just hacked and lost 440GB of data.

A major cybersecurity company was just hacked and lost 440GB of data.

The world-famous cybersecurity company Fortinet has just officially confirmed that a large amount of user data was stolen from the company's Microsoft Sharepoint server, and was posted on a hacker forum early in the morning of September 15.

New ransomware strain discovered that specializes in stealing login information from Chrome browser

New ransomware strain discovered that specializes in stealing login information from Chrome browser

A new strain of ransomware called Qilin has been discovered using a relatively sophisticated, highly customizable tactic to steal account login information stored in the Google Chrome browser.

Analyzing an Attack (Part 2)

Analyzing an Attack (Part 2)

We showed you in part one the information that can be observed while opening the packet sequence sent by Nmap. The sequence sent starts with an ICMP echo response to determine if the computer or network has been assigned an IP address.

Google Launches AI Video Creation Feature on Gemini

Google Launches AI Video Creation Feature on Gemini

Google has just announced that users can now create videos using artificial intelligence through its Gemini chatbot and the recently launched experimental tool Whisk.

Instructions for creating your own AI character to chat with everyone

Instructions for creating your own AI character to chat with everyone

Meta AI Studio now allows you to create your own AI character to chat with people in the style of the character you created and designed yourself.

Russia imposes heavy fine on Google, fine amount is many times the worlds GDP

Russia imposes heavy fine on Google, fine amount is many times the worlds GDP

A huge fine has been handed down in a legal dispute between Google and Russia over the suspension of pro-Kremlin YouTube accounts.

Latest Code of Legendary Hero and how to enter

Latest Code of Legendary Hero and how to enter

The journey to explore the world of Three Kingdoms in Legend of the Hero will become easier with a series of attractive giftcodes. Let's explore now.

The first person to have ChatGPT implanted in the brain to help manipulate electronic devices

The first person to have ChatGPT implanted in the brain to help manipulate electronic devices

ChatGPT is being tested by Synchron, one of the pioneers of brain implant (BCI) chips to help patients manipulate electronic devices.

How AI Art Generators Enhance Your Everyday Photos

How AI Art Generators Enhance Your Everyday Photos

Want to give your everyday photos a new look? AI art tools can add a unique and creative touch that you might not achieve with manual editing.

5 Reasons Operas Aria AI Is Useful

5 Reasons Operas Aria AI Is Useful

Many people are not into AI because they want to read raw data and analyze it themselves. However, try Opera's Aria AI when you are stuck with some tedious task and need ideas. Here's why Opera's Aria AI is useful!

Latest Code for House of Flying Daggers and how to redeem the code

Latest Code for House of Flying Daggers and how to redeem the code

Code Thap Dien Mai Phuc gives players Kim Nguyen Bao, Hoan Khon Halo, Gold, Huyen Tinh, Huyen Tinh Chest

Black Myth: Wukong steals the record from Cyberpunk 2077

Black Myth: Wukong steals the record from Cyberpunk 2077

With a slew of mostly positive reviews, it's no surprise that Black Myth: Wukong has been breaking records on Steam.

Learn about error code 0xc00000e and how to fix it

Learn about error code 0xc00000e and how to fix it

The dreaded Blue Screen of Death (BSOD) error code 0xc00000e, which often appears when starting Windows 10, can be confusing.

Play Together space, name the space Play Together

Play Together space, name the space Play Together

Many people use spaces in their Play Together names or use small underscores to create spaces between the letters you write in your name.

How to download Black Beacon PC

How to download Black Beacon PC

While it is entirely possible to experience Black Beacon on PC, the game is not officially optimized for this platform at this time.

Formula for calculating surface area and volume of sphere

Formula for calculating surface area and volume of sphere

The surface area of ​​a sphere is four times the area of ​​a large circle, which is four times the constant Pi multiplied by the square of the radius of the sphere.

Whats special about the spacesuit China chose for the first manned landing on the moon?

Whats special about the spacesuit China chose for the first manned landing on the moon?

China is aiming to send its first citizens to the Moon by 2030, and the country has just unveiled a newly designed spacesuit that will be used on the upcoming historic mission.

Foods that easily cause inflammation in the body

Foods that easily cause inflammation in the body

Many foods can cause inflammation and chronic disease. Here are the foods you should avoid consuming in large amounts if you don't want to bring disease into your body.