Cybercriminals Impersonate Google Ads in Promoted Results to Exploit Advertiser Accounts

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

Fake ads impersonating Google Ads redirect victims to counterfeit login pages to steal advertiser account credentials. Once compromised, these accounts are either resold on blackhat forums or kept by attackers to sustain and expand their fraudulent activities.  

Experts tracking this scheme have identified it as one of the most egregious malvertising campaigns to date, impacting thousands of advertisers worldwide.  

The phishing operation first raised suspicion when malicious ads claiming to be for Google Ads itself appeared in search results. Extensive investigation revealed a widespread campaign leveraging fraudulent "Sponsored" results that convincingly impersonate Google.  

Process flow for the Google Ads scam.
Process flow for this Google Ads heist campaign (Source: Malwarebytes)

These fake ads target both new and existing Google Ads users, offering sign-up or login options that appear legitimate. Clicking on these ads redirects users to a counterfeit Google Ads homepage hosted on Google Sites, a free platform that attackers exploit to bypass domain authentication rules.  

Fake ads found on Google Ads page.
A screenshot of fake Google Ads | Source: Malwarebytes

This loophole enables the fraudulent ads to appear indistinguishable from legitimate ones. On the fake page, users are invited to "Start now," after which they are redirected to a phishing site designed to steal login credentials.  

Screenshot of the redirected phishing page.
Screenshot of the redirected page with a phishing kit | Source: Malwarebytes

Using a phishing kit embedded with JavaScript, attackers collect users' credentials, cookies, geolocation, and other identifying data. The stolen information is then transmitted to a remote server.  

Victims of this scam experience the following sequence of events:

Analysis indicates two major groups orchestrating this operation, with the most prolific likely operating out of Brazil. The second group appears to be Asia-based, using advertiser accounts from Hong Kong.  

A third variation of this campaign involves distributing malware instead of hijacking accounts, suggesting that some threat actors may be employing this method in a temporary capacity.

Despite ongoing efforts to report and mitigate these incidents, malicious ads continue to surface relentlessly, including for Slack, Google Safety Center, and Google Authenticator.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: