BTC $58379.9472
ETH $2982.7872
BNB $563.0335
SOL $134.7235
XRP $0.5177
stETH $2971.9755
DOGE $0.1303
TON $4.8905
ADA $0.4503
AVAX $33.3328
TRX $0.1205
wstETH $3474.4227
DOT $6.8866
WETH $2975.5564
WBTC $58376.0680
BCH $424.7496
LINK $13.3612
MATIC $0.6924
UNI $7.0434
ICP $13.2308
LTC $80.1663
DAI $1.0012
FDUSD $1.0026
CAKE $2.5276
RNDR $7.6591
IMX $2.0284
ETC $25.5672
NEAR $6.1572
HBAR $0.0999
FIL $5.7239
STX $2.1417
MNT $0.9501
PEPE $0.0000
OKB $48.7666
ATOM $8.7518
WIF $2.6145
VET $0.0353
KAS $0.1092
TAO $382.3435
MKR $2726.6998
USDE $0.9992
GRT $0.2436
XMR $123.2867
XLM $0.1111
FET $2.0170
INJ $23.7176
THETA $2.0387
BTC $58379.9472
ETH $2982.7872
BNB $563.0335
SOL $134.7235
XRP $0.5177
stETH $2971.9755
DOGE $0.1303
TON $4.8905
ADA $0.4503
AVAX $33.3328
TRX $0.1205
wstETH $3474.4227
DOT $6.8866
WETH $2975.5564
WBTC $58376.0680
BCH $424.7496
LINK $13.3612
MATIC $0.6924
UNI $7.0434
ICP $13.2308
LTC $80.1663
DAI $1.0012
FDUSD $1.0026
CAKE $2.5276
RNDR $7.6591
IMX $2.0284
ETC $25.5672
NEAR $6.1572
HBAR $0.0999
FIL $5.7239
STX $2.1417
MNT $0.9501
PEPE $0.0000
OKB $48.7666
ATOM $8.7518
WIF $2.6145
VET $0.0353
KAS $0.1092
TAO $382.3435
MKR $2726.6998
USDE $0.9992
GRT $0.2436
XMR $123.2867
XLM $0.1111
FET $2.0170
INJ $23.7176
THETA $2.0387
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals manipulate Google search results and distribute malicious software to individuals who are not exercising vigilance

    Researchers at Securonix have discovered a malicious campaign using fake WinSCP to trick people into installing real WinSCP software. The campaign, known as "SEO#LURKER," involves changing Google search results and putting fake ads in them. The malicious ads send people to a hacked WordPress site called "gameeweb[.]com," which then sends them to a phishing site controlled by the hackers.

    Attackers use Google's dynamic search ads to create redirect ads, with the main goal being to trick users into visiting a fake WinSCP website with the domain "winccp[.]net" and downloading malware. The correctness of the link header directly affects the success of the redirect, and if the link is set up incorrectly, hackers can easily "rickroll" the user.

    Malware is sent in the form of a ZIP archive with an executable file inside, and the fake WinSCP installer is needed to maintain the mask of deception. Python scripts that run in the background are also used to communicate with the attackers' remote server and provide instructions on how to run commands on the infected device.

    While malware is spread through Google Ads, hackers could use the same method to target users of other popular software.

    Author reign3d
    Why everyone needs to know about de-anonymization and how it works
    The EASIEST type of cyberattack to avoid!

    Comments 0

    Add comment