BTC $94167.1814
ETH $1786.6395
XRP $2.1956
BNB $602.7359
SOL $148.5148
DOGE $0.1817
ADA $0.7074
TRX $0.2517
stETH $1784.1381
WBTC $94129.3683
SUI $3.4353
LINK $14.7696
AVAX $21.9518
XLM $0.2889
USDS $1.0007
LEO $9.0325
TON $3.2197
HBAR $0.1910
wstETH $2144.0903
BCH $359.2934
DOT $4.2388
LTC $86.1975
HYPE $17.6418
BGB $4.4361
BSC-USD $0.9998
WETH $1787.0749
USDE $0.9994
BTCB $94120.0817
XMR $229.2697
PI $0.6453
weETH $1905.2350
WBT $29.2427
PEPE $0.0000
APT $5.5706
UNI $5.7876
DAI $1.0000
OKB $52.7132
ONDO $1.0001
NEAR $2.6093
TRUMP $15.0881
TAO $342.7013
ICP $5.2795
GT $22.7063
CBBTC $94233.7487
KAS $0.1008
CRO $0.0912
ETC $16.9617
BTC $94167.1814
ETH $1786.6395
XRP $2.1956
BNB $602.7359
SOL $148.5148
DOGE $0.1817
ADA $0.7074
TRX $0.2517
stETH $1784.1381
WBTC $94129.3683
SUI $3.4353
LINK $14.7696
AVAX $21.9518
XLM $0.2889
USDS $1.0007
LEO $9.0325
TON $3.2197
HBAR $0.1910
wstETH $2144.0903
BCH $359.2934
DOT $4.2388
LTC $86.1975
HYPE $17.6418
BGB $4.4361
BSC-USD $0.9998
WETH $1787.0749
USDE $0.9994
BTCB $94120.0817
XMR $229.2697
PI $0.6453
weETH $1905.2350
WBT $29.2427
PEPE $0.0000
APT $5.5706
UNI $5.7876
DAI $1.0000
OKB $52.7132
ONDO $1.0001
NEAR $2.6093
TRUMP $15.0881
TAO $342.7013
ICP $5.2795
GT $22.7063
CBBTC $94233.7487
KAS $0.1008
CRO $0.0912
ETC $16.9617
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals manipulate Google search results and distribute malicious software to individuals who are not exercising vigilance

    Researchers at Securonix have discovered a malicious campaign using fake WinSCP to trick people into installing real WinSCP software. The campaign, known as "SEO#LURKER," involves changing Google search results and putting fake ads in them. The malicious ads send people to a hacked WordPress site called "gameeweb[.]com," which then sends them to a phishing site controlled by the hackers.

    Attackers use Google's dynamic search ads to create redirect ads, with the main goal being to trick users into visiting a fake WinSCP website with the domain "winccp[.]net" and downloading malware. The correctness of the link header directly affects the success of the redirect, and if the link is set up incorrectly, hackers can easily "rickroll" the user.

    Malware is sent in the form of a ZIP archive with an executable file inside, and the fake WinSCP installer is needed to maintain the mask of deception. Python scripts that run in the background are also used to communicate with the attackers' remote server and provide instructions on how to run commands on the infected device.

    While malware is spread through Google Ads, hackers could use the same method to target users of other popular software.

    Author reign3d
    Why everyone needs to know about de-anonymization and how it works
    The EASIEST type of cyberattack to avoid!

    Comments 0

    Add comment