BTC $94413.1122
ETH $1801.1486
XRP $2.2018
BNB $608.4723
SOL $149.3894
DOGE $0.1827
ADA $0.7101
TRX $0.2508
stETH $1798.3100
WBTC $94318.8244
SUI $3.4796
LINK $14.9263
AVAX $22.0405
XLM $0.2902
USDS $0.9994
LEO $9.0905
TON $3.2844
HBAR $0.1930
wstETH $2161.6993
BCH $359.7483
DOT $4.2843
LTC $86.6663
HYPE $17.8139
BGB $4.4195
BSC-USD $1.0010
WETH $1801.6115
USDE $0.9993
BTCB $94443.5233
XMR $229.4576
PI $0.6472
weETH $1920.2314
WBT $29.3493
PEPE $0.0000
APT $5.5990
UNI $5.8328
DAI $1.0000
ONDO $1.0118
OKB $52.6174
NEAR $2.6070
TRUMP $15.4506
TAO $347.7875
ICP $5.3057
GT $22.5643
KAS $0.1013
CBBTC $94381.0014
CRO $0.0915
ETC $17.1308
BTC $94413.1122
ETH $1801.1486
XRP $2.2018
BNB $608.4723
SOL $149.3894
DOGE $0.1827
ADA $0.7101
TRX $0.2508
stETH $1798.3100
WBTC $94318.8244
SUI $3.4796
LINK $14.9263
AVAX $22.0405
XLM $0.2902
USDS $0.9994
LEO $9.0905
TON $3.2844
HBAR $0.1930
wstETH $2161.6993
BCH $359.7483
DOT $4.2843
LTC $86.6663
HYPE $17.8139
BGB $4.4195
BSC-USD $1.0010
WETH $1801.6115
USDE $0.9993
BTCB $94443.5233
XMR $229.4576
PI $0.6472
weETH $1920.2314
WBT $29.3493
PEPE $0.0000
APT $5.5990
UNI $5.8328
DAI $1.0000
ONDO $1.0118
OKB $52.6174
NEAR $2.6070
TRUMP $15.4506
TAO $347.7875
ICP $5.3057
GT $22.5643
KAS $0.1013
CBBTC $94381.0014
CRO $0.0915
ETC $17.1308
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals manipulate Google search results and distribute malicious software to individuals who are not exercising vigilance

    Researchers at Securonix have discovered a malicious campaign using fake WinSCP to trick people into installing real WinSCP software. The campaign, known as "SEO#LURKER," involves changing Google search results and putting fake ads in them. The malicious ads send people to a hacked WordPress site called "gameeweb[.]com," which then sends them to a phishing site controlled by the hackers.

    Attackers use Google's dynamic search ads to create redirect ads, with the main goal being to trick users into visiting a fake WinSCP website with the domain "winccp[.]net" and downloading malware. The correctness of the link header directly affects the success of the redirect, and if the link is set up incorrectly, hackers can easily "rickroll" the user.

    Malware is sent in the form of a ZIP archive with an executable file inside, and the fake WinSCP installer is needed to maintain the mask of deception. Python scripts that run in the background are also used to communicate with the attackers' remote server and provide instructions on how to run commands on the infected device.

    While malware is spread through Google Ads, hackers could use the same method to target users of other popular software.

    Author reign3d
    Why everyone needs to know about de-anonymization and how it works
    The EASIEST type of cyberattack to avoid!

    Comments 0

    Add comment