BTC $105253.4219
ETH $2536.7414
XRP $2.1651
BNB $647.0731
SOL $152.2894
DOGE $0.1737
TRX $0.2723
ADA $0.6293
stETH $2531.8307
WBTC $105225.0714
HYPE $40.9323
wstETH $3063.7485
SUI $3.0141
BCH $461.0753
USDS $1.0002
LINK $13.1299
LEO $9.2628
AVAX $19.0735
XLM $0.2566
ONDO $0.7870
TON $2.9810
BTCB $105622.0912
WBT $39.4383
weETH $2714.1320
LTC $86.0318
HBAR $0.1525
WETH $2427.7112
BSC-USD $1.0051
DOT $3.7822
USDE $0.9994
XMR $311.9835
BGB $4.5146
PEPE $0.0000
PI $0.6036
AAVE $272.4915
UNI $7.0627
sUSDe $1.1822
DAI $0.9996
TAO $367.4616
OKB $51.4328
CBBTC $105258.6281
ICP $5.4192
APT $4.4910
CRO $0.0901
NEAR $2.1924
ETC $16.5423
JITOSOL $184.2161
BTC $105253.4219
ETH $2536.7414
XRP $2.1651
BNB $647.0731
SOL $152.2894
DOGE $0.1737
TRX $0.2723
ADA $0.6293
stETH $2531.8307
WBTC $105225.0714
HYPE $40.9323
wstETH $3063.7485
SUI $3.0141
BCH $461.0753
USDS $1.0002
LINK $13.1299
LEO $9.2628
AVAX $19.0735
XLM $0.2566
ONDO $0.7870
TON $2.9810
BTCB $105622.0912
WBT $39.4383
weETH $2714.1320
LTC $86.0318
HBAR $0.1525
WETH $2427.7112
BSC-USD $1.0051
DOT $3.7822
USDE $0.9994
XMR $311.9835
BGB $4.5146
PEPE $0.0000
PI $0.6036
AAVE $272.4915
UNI $7.0627
sUSDe $1.1822
DAI $0.9996
TAO $367.4616
OKB $51.4328
CBBTC $105258.6281
ICP $5.4192
APT $4.4910
CRO $0.0901
NEAR $2.1924
ETC $16.5423
JITOSOL $184.2161
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals manipulate Google search results and distribute malicious software to individuals who are not exercising vigilance

    Researchers at Securonix have discovered a malicious campaign using fake WinSCP to trick people into installing real WinSCP software. The campaign, known as "SEO#LURKER," involves changing Google search results and putting fake ads in them. The malicious ads send people to a hacked WordPress site called "gameeweb[.]com," which then sends them to a phishing site controlled by the hackers.

    Attackers use Google's dynamic search ads to create redirect ads, with the main goal being to trick users into visiting a fake WinSCP website with the domain "winccp[.]net" and downloading malware. The correctness of the link header directly affects the success of the redirect, and if the link is set up incorrectly, hackers can easily "rickroll" the user.

    Malware is sent in the form of a ZIP archive with an executable file inside, and the fake WinSCP installer is needed to maintain the mask of deception. Python scripts that run in the background are also used to communicate with the attackers' remote server and provide instructions on how to run commands on the infected device.

    While malware is spread through Google Ads, hackers could use the same method to target users of other popular software.

    Author reign3d
    Why everyone needs to know about de-anonymization and how it works
    The EASIEST type of cyberattack to avoid!

    Comments 0

    Add comment