BTC $104643.8693
ETH $2528.9095
XRP $2.1781
BNB $658.6369
SOL $156.5672
DOGE $0.1927
ADA $0.6859
TRX $0.2657
stETH $2526.0545
WBTC $104508.6704
HYPE $32.7112
SUI $3.2473
wstETH $3038.0998
LINK $13.9725
AVAX $20.8136
USDS $0.9977
BCH $414.9108
XLM $0.2642
LEO $8.6137
TON $3.1519
HBAR $0.1675
WETH $2528.5693
LTC $87.0428
DOT $4.0798
weETH $2701.4981
BSC-USD $0.9999
XMR $324.0059
BGB $4.7520
BTCB $104565.8969
WBT $31.1816
USDE $1.0011
PEPE $0.0000
PI $0.6539
TAO $430.8337
AAVE $247.0654
UNI $6.0568
DAI $0.9996
CRO $0.1056
OKB $50.5352
sUSDe $1.1762
APT $4.7290
NEAR $2.4211
CBBTC $104625.9021
ONDO $0.8330
ICP $4.9075
ETC $16.9615
GT $19.3318
BTC $104643.8693
ETH $2528.9095
XRP $2.1781
BNB $658.6369
SOL $156.5672
DOGE $0.1927
ADA $0.6859
TRX $0.2657
stETH $2526.0545
WBTC $104508.6704
HYPE $32.7112
SUI $3.2473
wstETH $3038.0998
LINK $13.9725
AVAX $20.8136
USDS $0.9977
BCH $414.9108
XLM $0.2642
LEO $8.6137
TON $3.1519
HBAR $0.1675
WETH $2528.5693
LTC $87.0428
DOT $4.0798
weETH $2701.4981
BSC-USD $0.9999
XMR $324.0059
BGB $4.7520
BTCB $104565.8969
WBT $31.1816
USDE $1.0011
PEPE $0.0000
PI $0.6539
TAO $430.8337
AAVE $247.0654
UNI $6.0568
DAI $0.9996
CRO $0.1056
OKB $50.5352
sUSDe $1.1762
APT $4.7290
NEAR $2.4211
CBBTC $104625.9021
ONDO $0.8330
ICP $4.9075
ETC $16.9615
GT $19.3318
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cybercriminals manipulate Google search results and distribute malicious software to individuals who are not exercising vigilance

    Researchers at Securonix have discovered a malicious campaign using fake WinSCP to trick people into installing real WinSCP software. The campaign, known as "SEO#LURKER," involves changing Google search results and putting fake ads in them. The malicious ads send people to a hacked WordPress site called "gameeweb[.]com," which then sends them to a phishing site controlled by the hackers.

    Attackers use Google's dynamic search ads to create redirect ads, with the main goal being to trick users into visiting a fake WinSCP website with the domain "winccp[.]net" and downloading malware. The correctness of the link header directly affects the success of the redirect, and if the link is set up incorrectly, hackers can easily "rickroll" the user.

    Malware is sent in the form of a ZIP archive with an executable file inside, and the fake WinSCP installer is needed to maintain the mask of deception. Python scripts that run in the background are also used to communicate with the attackers' remote server and provide instructions on how to run commands on the infected device.

    While malware is spread through Google Ads, hackers could use the same method to target users of other popular software.

    Author reign3d
    Why everyone needs to know about de-anonymization and how it works
    The EASIEST type of cyberattack to avoid!

    Comments 0

    Add comment