Cybercriminals are spreading malware using... Google Search
A new attack campaign that spreads malware through Google search results has been discovered by security experts from Palo Alto Networks.
You may recall a time when malware would create pop-up windows, delete data, or even crash your PC. However, modern malware is much more stealthy and tries to have as little impact on the victim’s PC as possible.
But why is new malware being developed to hide from users, and what does that say about the current cybercrime world?
Why is modern malware more stealthy than old malware?

While old malware was often focused on destroying data, this changed when cybercriminals learned that they could monetize their creations. Why cause damage when you can use your skills to earn extra income?
To maximize the amount of money malware can make from its owners, it is often designed to be hidden from users. The longer the malware stays on a PC, the more money its creators make.
That’s not to say that all malware designed to make money is designed to be stealthy. When a malware strain is designed to instill fear in users, it will often make itself very visible. Examples include ransomware and fake virus scans that make it very clear that it wants you to pay. However, most of the time, they will try to stay undetected for as long as possible.
Cryptojacking malware wants to stay secret because that’s how it makes money for the developer. It sits on your PC and uses its resources to mine cryptocurrency, which is sent to the malware developer. The more unchecked Cryptojacking malware is, the more money it makes.
Botnet malware remains hidden because that’s how its owners send commands to your PC. Left unchecked, a PC “recruited” into a botnet could send spam emails or launch DDoS attacks on services. As long as the malware remains on your PC, it remains part of a larger botnet.
Stealing sensitive information
Some types of malware collect information from you. These include keyloggers that sit dormant on your computer and relay your keystrokes to cybercriminals, or banking Trojans designed to steal login credentials for sensitive services. Everything from your credit card information to your account logins is transmitted back, and as long as that information isn’t deleted, it can collect as much as it wants.
How does modern malware evade detection?

It may seem strange that malware goes undetected, as antivirus programs have never been better. However, cybercriminals use a number of tricks to get past your defenses.
Using Fileless Malware
Fileless Malware can bypass antivirus programs because it doesn't place any files on your computer. Instead, it all runs in your computer's memory (RAM), where antivirus programs don't look. From there, it can stage further attacks without being detected.
Fileless Malware can be difficult to detect and remove, so the best way to prevent infection is to be extremely careful around common malware sources.
Impersonating a legitimate application
Cybercriminals sometimes create apps that appear legitimate. They either copy a real app or find a popular service that doesn’t have one and create a fake one. For example, a malicious Google Play Store app stole $70,000 by pretending to be the official app for a cryptocurrency service.
To avoid falling into the trap of cybercriminals, check out how to spot fake Android apps so you can better protect yourself.
Find unsafe targets using Internet connection
Sometimes, cybercriminals don’t need to do anything fancy to spread malware. With the rise of smart homes and Internet of Things (IoT) devices, we’re seeing a wave of gadgets accessing the internet without properly securing their connections. Cybercriminals can then hijack these devices for their own purposes without being detected, such as with IoT botnets.
Always remember that connecting devices to the Internet is a two-way street. If you buy an Internet-connected gadget, make sure it's from a brand you trust. This is especially important for any device that could potentially compromise your privacy if it falls into the wrong hands, such as a smart home camera. And if the thought of hackers gaining access to your device makes you shudder, it's best to opt for an alternative that doesn't connect to the Internet, such as a gadget that runs on your local network.
Now that bad actors are using their skills to make money, much of the malware is much stealthier than it used to be. The best way to avoid having to deal with a stealthy virus is to make sure you don’t get infected in the first place, and with a little knowledge, you can protect yourself from these new strains.
A new attack campaign that spreads malware through Google search results has been discovered by security experts from Palo Alto Networks.
Nowadays, malicious links appear more and more and are shared through social networks at a dizzying speed. Just clicking on a malicious link can bring potential dangers to you.
Some crafty scammers have figured out how to trick people into installing malicious apps that steal their banking details, and it all starts with a hand-delivered letter in the post.
A new strain of ransomware called Qilin has been discovered using a relatively sophisticated, highly customizable tactic to steal account login information stored in the Google Chrome browser.
Microsoft has just officially warned users about the existence of a vulnerability that could allow hackers to easily spread malware through the Outlook email application.
A cybersecurity firm has discovered a huge number of Android apps containing malicious code (adware), a discovery that also raises big questions about how Google monitors its online store.
Nowadays, free wifi networks are installed everywhere, from coffee shops, amusement parks, shopping malls, etc. This is very convenient for us users to be able to connect to the network everywhere to surf Facebook and work. However, is using free wifi safe?
Unfortunately, bad actors know this and have created fake CAPTCHAs that will infect your PC with malware.
There is a dangerous trend being deployed by the global hacker community, which is abusing the Google Ads platform to spread malicious code.
Stuxnet is a malicious computer worm that was first discovered in June 2010 after it paralyzed Iran's nuclear facilities. And to this day, Stuxnet is still a terrifying obsession for the global Internet.
Often distributed in a malware-as-a-service model, infostealer malware is often used to steal data, remaining hidden for as long as possible.
As one of the most popular website building tools in the world, WordPress is once again a target for malware.
Even though Windows 10 will stop being supported after October 14, 2025, many Steam users are still using the operating system.
Keyloggers are extremely dangerous programs that hackers install on any user's system with the aim of stealing passwords, credit card information, etc. Keyloggers store all the keystrokes that users perform on the computer and provide hackers with important user information.
Tired of the frustrating Microsoft Teams "Check Version" error blocking your meetings? Follow our proven, step-by-step fixes to resolve it fast and restore smooth teamwork. Works on latest versions!
Struggling with the wrong Microsoft Teams account on Windows 11? Discover simple, step-by-step instructions to remove and change your Microsoft Teams account effortlessly. Perfect for managing work and personal profiles!
Struggling with Microsoft Teams "Guide" Tutorial Error? Discover simple, step-by-step fixes to resolve it quickly. Clear cache, update, and more for seamless teamwork. Updated for latest versions!
Struggling with Microsoft Teams for Mac sync errors? Follow this ultimate troubleshooting guide with step-by-step fixes to resolve sync issues quickly and get back to seamless collaboration on macOS. Updated with the latest solutions.
Tired of the frustrating Microsoft Teams "Website Error" loading issue? Follow our proven, step-by-step fixes to resolve it fast and restore smooth teamwork. Works on all browsers!
Struggling with Microsoft Teams Remote Control Error? Discover step-by-step troubleshooting for Remote Control issues in Teams. Quick fixes, common causes, and expert tips to get back to seamless collaboration. Updated with the latest solutions.
Struggling with Microsoft Teams "Media Error" Microphone? Get instant fixes for crystal-clear audio. Step-by-step solutions for permissions, drivers, and more – no tech skills needed!
Tired of the frustrating Microsoft Teams "Error" on your desktop shortcut? Discover proven, step-by-step solutions to resolve it fast and restore smooth teamwork. No tech skills needed!
Stuck with Microsoft Teams "Error P" password error? Discover quick, effective troubleshooting steps to resolve login issues and get back to seamless collaboration in minutes. Updated with the latest fixes.
Frustrated with Microsoft Teams "Welcome" screen stuck on Error 2026? Discover proven, step-by-step fixes to resolve it fast and get back to seamless collaboration. Updated with the latest tips!
Struggling with Microsoft Teams "Action Required" login error? Discover step-by-step troubleshooting fixes, clear cache methods, and quick solutions to get back to seamless collaboration. Updated with the latest tips for instant relief.
Facing Microsoft Teams Webinar Registration Error? Follow our proven, step-by-step guide to fix it quickly and get back to seamless webinar registrations. Latest troubleshooting tips included!
Tired of Microsoft Teams "Joining Error: Meeting Full"? Get proven, step-by-step solutions to bypass the error and join instantly. Latest fixes for seamless meetings!
Tired of the frustrating Microsoft Teams recording error: Permission Required? Follow our expert, step-by-step guide to regain recording access instantly with the latest Teams policies and fixes. No tech skills needed!
Tired of Microsoft Teams Error Report Not Sending? Discover quick, effective troubleshooting steps to resolve it fast and get back to seamless collaboration. Expert tips included!