Google ads push fake Google Authenticator site installing malware | The ad displays "google.com" and "https://www.google.com" as the click URL, and the advertiser's identity is verified by Google (www.bleepingcomputer.com)
from ForgottenFlux@lemmy.world to technology@lemmy.world on 01 Aug 2024 18:59
https://lemmy.world/post/18185511

Google has fallen victim to its own ad platform, allowing threat actors to create fake Google Authenticator ads that push the DeerStealer information-stealing malware.

In a new malvertising campaign found by Malwarebytes, threat actors created ads that display an advertisement for Google Authenticator when users search for the software in Google search.

What makes the ad more convincing is that it shows ‘google.com’ and “www.google.com” as the click URL, which clearly should not be allowed when a third party creates the advertisement.

We have seen this very effective URL cloaking strategy in past malvertising campaigns, including for KeePass, Arc browser, YouTube, and Amazon. Still, Google continues to fail to detect when these imposter ads are created.

Malwarebytes noted that the advertiser’s identity is verified by Google, showing another weakness in the ad platform that threat actors abuse.

When the download is executed, it will launch the DeerStealer information-stealing malware, which steals credentials, cookies, and other information stored in your web browser.

Users looking to download software are recommended to avoid clicking on promoted results on Google Search, use an ad blocker, or bookmark the URLs of software projects they typically use.

Before downloading a file, ensure that the URL you’re on corresponds to the project’s official domain. Also, always scan downloaded files with an up-to-date AV tool before executing.

#technology

threaded - newest

Telorand@reddthat.com on 01 Aug 2024 19:22 next collapse

The ad blocking will continue until malvertisement prevention improves.

ptz@dubvee.org on 01 Aug 2024 19:26 next collapse

Ad Blocking >= Antivirus

[deleted] on 02 Aug 2024 10:55 collapse

.

kevincox@lemmy.ml on 01 Aug 2024 19:42 next collapse

Allowing showing different domains than the actual click target is wildly reckless and should be punishable.

“Oh but our poor advertisers want to use click tracking and it is too hard to set up on their main domain”. Oh boo hoo, I’m sure if it is important to them they will figure it out.

trashgirlfriend@lemmy.world on 01 Aug 2024 22:06 next collapse

I worked for Google Ads support for a while and even this dumbed down system completely stumped so many fucking people.

God I hate advertising and advertisers so much.

These useless fucking cunts wanted every feature imaginable, setup for free, with no effort of research done from them.

That job made me hate taxi drivers so much.

uninvitedguest@lemmy.ca on 01 Aug 2024 23:02 collapse

What do taxi drivers have to do with it?

Plopp@lemmy.world on 02 Aug 2024 06:37 collapse

They are probably in cahoots with the lemon stealing whores.

uninvitedguest@lemmy.ca on 02 Aug 2024 12:38 collapse

What do lemons have to do with it?

Plopp@lemmy.world on 02 Aug 2024 17:23 collapse

The lemon was stealing all the whores and used a taxi to get away with them.

CosmicTurtle0@lemmy.dbzer0.com on 01 Aug 2024 23:14 next collapse

Even then it should be easy to add an additional field in their ad profile. Like “provide a list of domains your ads will go to.”

And then set up some sort of domain authentication similar to let’s encrypt or SPF records.

Wispy2891@lemmy.world on 02 Aug 2024 12:59 collapse

Probably they exploited the Google search redirect to have show google.com

Like this www.google.com/search?q=example&btnI

And because Google is a startup with limited resources they didn’t implement a check against that

kevincox@lemmy.ml on 02 Aug 2024 13:01 collapse

Probably not. Google Ads explicitly allows mismatch between displayed domain and actual domain. This is literally a supported configuration with no tricks.

The link you sent gives me a “Redirect Notice” interstitial that mitigates this attack greatly.

helenslunch@feddit.nl on 01 Aug 2024 19:58 next collapse

At Google’s pace they’ll probably fix this in 10 years or so.

trashgirlfriend@lemmy.world on 01 Aug 2024 22:09 collapse

As a p1 bug it will likely be looked at by someone within the next 1-2 years

paraphrand@lemmy.world on 01 Aug 2024 20:21 next collapse

Google.com isn’t at the top of the banned words list?

_haha_oh_wow_@sh.itjust.works on 01 Aug 2024 20:46 next collapse

“WhY aRe PeOpLe bLoCkInG aDs!?”

-Google

BurningnnTree@lemmy.one on 01 Aug 2024 20:45 next collapse

I’m confused, does this mean that an ad can show the URL “google.com” even though clicking on it will take you to a different URL? Why doesn’t Google just make it so that the ad shows the actual URL that the ad links to?

Ghoelian@lemmy.dbzer0.com on 01 Aug 2024 21:06 next collapse

That’s actually pretty simple to do. I don’t know if this is how they did it, but one way is just creating an <a> tag with the href to google.com. that’ll show the destination if you hover over it. Then you just add an event listener to the click event, prevent the default event from executing, and manually redirect somewhere else.

Made a quick example: codepen.io/Ghoelian/pen/poXeOyo

catloaf@lemm.ee on 01 Aug 2024 21:16 collapse

Yes, but ads shouldn’t have that level of control. They should provide an image or video and a link.

Ghoelian@lemmy.dbzer0.com on 02 Aug 2024 10:08 collapse

Oh absolutely. I kinda feel like preventing the default action on a tag like that should just not be allowed, or browsers should not display the target link thing if it has an event listener attached or something.

undefined@links.hackliberty.org on 02 Aug 2024 03:02 collapse

If I remember correctly the bad guys use similar characters that render the same (or close to) “standard” characters.

flop_leash_973@lemmy.world on 01 Aug 2024 21:18 next collapse

This kind of shit is why Googles (and anyone else that tries it as well) ever increasing push to put a layer of ads into anything is so off putting to me. Sure ads are annoying, but they are also probably second only to social engineering as the method for someones device and accounts getting compromised.

I personally will not go back to the days where just the act of visiting a website and clicking on nothing has a good chance of loading some Javascript and infecting my browser or whole device with the drive by malware of the day because the shit heads that run the site are to lazy to vet what they are letting their site call out too and the third party ad networks are to lazy to vet what sorts of things they are allowing their ad networks to serve.

lone_faerie@lemmy.blahaj.zone on 02 Aug 2024 02:17 next collapse

Google has shown time and time again they couldn’t care less how malicious an ad is, they’re still getting paid

LunchMoneyThief@links.hackliberty.org on 02 Aug 2024 04:24 collapse

Ads are always malicious, and I’m not talking about just the technical.

Plopp@lemmy.world on 02 Aug 2024 06:34 collapse

Ads are manipulation, so yes.

Metype@lemmy.world on 04 Aug 2024 05:11 collapse

Need therapy.

(Chic ‘N’ Stu)

MonkderVierte@lemmy.ml on 02 Aug 2024 10:56 next collapse

My E-Mail client warns me if the URL is too different from the designator. Is there something like this for Firefox?

yamanii@lemmy.world on 02 Aug 2024 17:59 collapse

As always, ublock origin is fair game, google even had his identity verified.