BTC $104314.8953
ETH $2506.8903
XRP $2.1735
BNB $643.3542
SOL $145.6668
TRX $0.2747
DOGE $0.1699
stETH $2529.8991
ADA $0.6001
WBTC $104256.8202
HYPE $36.2626
wstETH $3021.4520
BCH $495.6709
SUI $2.8389
USDS $1.0001
LINK $13.0265
WBT $49.1303
LEO $8.9577
XLM $0.2502
ONDO $0.7662
AVAX $17.9580
TON $2.9482
WETH $2507.4707
weETH $2681.5890
LTC $85.2780
HBAR $0.1469
BSC-USD $0.9782
USDE $1.0005
XMR $315.1005
DOT $3.5565
BTCB $102751.6081
BGB $4.2577
PEPE $0.0000
UNI $7.5515
PI $0.5361
AAVE $252.9125
DAI $0.9992
OKB $52.4836
TAO $348.3839
CBBTC $104237.2987
CRO $0.0907
APT $4.3618
ICP $5.0309
NEAR $2.1906
ETC $16.6802
JITOSOL $176.2469
USD1 $1.0076
BTC $104314.8953
ETH $2506.8903
XRP $2.1735
BNB $643.3542
SOL $145.6668
TRX $0.2747
DOGE $0.1699
stETH $2529.8991
ADA $0.6001
WBTC $104256.8202
HYPE $36.2626
wstETH $3021.4520
BCH $495.6709
SUI $2.8389
USDS $1.0001
LINK $13.0265
WBT $49.1303
LEO $8.9577
XLM $0.2502
ONDO $0.7662
AVAX $17.9580
TON $2.9482
WETH $2507.4707
weETH $2681.5890
LTC $85.2780
HBAR $0.1469
BSC-USD $0.9782
USDE $1.0005
XMR $315.1005
DOT $3.5565
BTCB $102751.6081
BGB $4.2577
PEPE $0.0000
UNI $7.5515
PI $0.5361
AAVE $252.9125
DAI $0.9992
OKB $52.4836
TAO $348.3839
CBBTC $104237.2987
CRO $0.0907
APT $4.3618
ICP $5.0309
NEAR $2.1906
ETC $16.6802
JITOSOL $176.2469
USD1 $1.0076
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals manipulate Google search results and distribute malicious software to individuals who are not exercising vigilance

    Researchers at Securonix have discovered a malicious campaign using fake WinSCP to trick people into installing real WinSCP software. The campaign, known as "SEO#LURKER," involves changing Google search results and putting fake ads in them. The malicious ads send people to a hacked WordPress site called "gameeweb[.]com," which then sends them to a phishing site controlled by the hackers.

    Attackers use Google's dynamic search ads to create redirect ads, with the main goal being to trick users into visiting a fake WinSCP website with the domain "winccp[.]net" and downloading malware. The correctness of the link header directly affects the success of the redirect, and if the link is set up incorrectly, hackers can easily "rickroll" the user.

    Malware is sent in the form of a ZIP archive with an executable file inside, and the fake WinSCP installer is needed to maintain the mask of deception. Python scripts that run in the background are also used to communicate with the attackers' remote server and provide instructions on how to run commands on the infected device.

    While malware is spread through Google Ads, hackers could use the same method to target users of other popular software.

    Author reign3d
    Why everyone needs to know about de-anonymization and how it works
    The EASIEST type of cyberattack to avoid!

    Comments 0

    Add comment