BTC $65244.2218
ETH $2944.8959
BNB $569.2880
SOL $159.1004
XRP $0.5158
stETH $2943.1452
TON $6.7761
DOGE $0.1497
ADA $0.4596
AVAX $34.4543
TRX $0.1251
WBTC $65283.3177
wstETH $3432.1270
DOT $7.0258
WETH $2942.8708
LINK $15.5085
BCH $444.9513
MATIC $0.6936
UNI $7.2918
LTC $82.4753
FET $2.2814
ICP $12.1671
RNDR $10.0539
DAI $1.0005
NEAR $8.0135
IMX $2.3805
CAKE $2.5817
PEPE $0.0000
HBAR $0.1123
ETC $27.2615
FDUSD $0.9997
FIL $5.7497
MNT $0.9718
OKB $49.5813
AR $44.2792
STX $1.9760
GRT $0.3031
KAS $0.1202
WIF $2.8394
ATOM $8.5275
TAO $382.4239
VET $0.0353
MKR $2694.5134
XMR $133.9206
USDE $1.0009
THETA $2.1949
INJ $23.4169
BTC $65244.2218
ETH $2944.8959
BNB $569.2880
SOL $159.1004
XRP $0.5158
stETH $2943.1452
TON $6.7761
DOGE $0.1497
ADA $0.4596
AVAX $34.4543
TRX $0.1251
WBTC $65283.3177
wstETH $3432.1270
DOT $7.0258
WETH $2942.8708
LINK $15.5085
BCH $444.9513
MATIC $0.6936
UNI $7.2918
LTC $82.4753
FET $2.2814
ICP $12.1671
RNDR $10.0539
DAI $1.0005
NEAR $8.0135
IMX $2.3805
CAKE $2.5817
PEPE $0.0000
HBAR $0.1123
ETC $27.2615
FDUSD $0.9997
FIL $5.7497
MNT $0.9718
OKB $49.5813
AR $44.2792
STX $1.9760
GRT $0.3031
KAS $0.1202
WIF $2.8394
ATOM $8.5275
TAO $382.4239
VET $0.0353
MKR $2694.5134
XMR $133.9206
USDE $1.0009
THETA $2.1949
INJ $23.4169
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals manipulate Google search results and distribute malicious software to individuals who are not exercising vigilance

    Researchers at Securonix have discovered a malicious campaign using fake WinSCP to trick people into installing real WinSCP software. The campaign, known as "SEO#LURKER," involves changing Google search results and putting fake ads in them. The malicious ads send people to a hacked WordPress site called "gameeweb[.]com," which then sends them to a phishing site controlled by the hackers.

    Attackers use Google's dynamic search ads to create redirect ads, with the main goal being to trick users into visiting a fake WinSCP website with the domain "winccp[.]net" and downloading malware. The correctness of the link header directly affects the success of the redirect, and if the link is set up incorrectly, hackers can easily "rickroll" the user.

    Malware is sent in the form of a ZIP archive with an executable file inside, and the fake WinSCP installer is needed to maintain the mask of deception. Python scripts that run in the background are also used to communicate with the attackers' remote server and provide instructions on how to run commands on the infected device.

    While malware is spread through Google Ads, hackers could use the same method to target users of other popular software.

    Author reign3d
    Why everyone needs to know about de-anonymization and how it works
    The EASIEST type of cyberattack to avoid!

    Comments 0

    Add comment