all InfoSec news
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
April 18, 2024, 4:48 a.m. | info@thehackernews.com (The Hacker News)
The Hacker News thehackernews.com
"The threat actor registered multiple look-alike domains using a typosquatting technique and leveraged Google Ads to push these domains to the top of search engine results targeting specific search keywords, thereby
actor ads backdoor campaign cluster domains fake google google ads hidden ip scanner malicious malvertising malvertising campaign scanner search software threat threat actor typosquatting
More from thehackernews.com / The Hacker News
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Senior Security Architect - Northwest region (Remote)
@ GuidePoint Security LLC | Remote
Senior Consultant, Cyber Security Architecture
@ 6point6 | Manchester, United Kingdom
Junior Security Architect
@ IQ-EQ | Port Louis, Mauritius
Senior Detection & Response Engineer
@ Expel | Remote
Cyber Security Systems Engineer ISSE Splunk
@ SAP | Southbank (Melbourne), VIC, AU, 3006