all InfoSec news
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
April 18, 2024, 4:48 a.m. | info@thehackernews.com (The Hacker News)
The Hacker News thehackernews.com
"The threat actor registered multiple look-alike domains using a typosquatting technique and leveraged Google Ads to push these domains to the top of search engine results targeting specific search keywords, thereby
actor ads backdoor campaign cluster domains fake google google ads hidden ip scanner malicious malvertising malvertising campaign scanner search software threat threat actor typosquatting
More from thehackernews.com / The Hacker News
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Senior - Penetration Tester
@ Deloitte | Madrid, España
Associate Cyber Incident Responder
@ Highmark Health | PA, Working at Home - Pennsylvania
Senior Insider Threat Analyst
@ IT Concepts Inc. | Woodlawn, Maryland, United States