The malvertising campaign was first reported last week by a US user who posted his observations to a StackExchange thread and was then reported by Bleepingcomputer.com.
Just querying Google for the term “target,” users were displayed on the top right of the page of the results the malicious ads.
The bogus ads leverage a feature of oogle Ads service that allows ad publishers to display a URL while redirecting users to another URL.
In the specific case, the rogue ad displayed the link “target.com,” but users were redirected to “tech-supportcenter.us.”
In the attack reported by the US users, when users clicked the malicious ad they were redirected to a tech support scam instead of the legitimate website Target.com.
The landing page was a fake Microsoft tech support page urging users to call a phone number to remove a non-existent “HARDDISK_ROOTKIT_TROJAN_HUACK.EXE” file.
The landing page was registered to a Georgian man and was hosted on two IP addresses, 104.28.19[.]58 and 104.28.18[.]58], that were involved in the past in similar fraudulent activities, including tech support scams, malware hosting, and pharma spam.
According to VirusTotal logs the malvertising campaign also targeted Walmart users.
Unfortunately, such kind of attacks is not new for cybersecurity experts, in the past other malvertising campaigns hit Google.
(Security Affairs – Malicious ads, malvertising)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.