In this internet era, every one of us is familiar with the google search engine, and we use it to browse so many topics in our day-to-day life. While browsing, many of us would have noticed small pop-ups or small boxes of ads displayed along the sides of the website. Most of the time, the ads will be customized to your personal interests. Before you click on these ads, have you paused for a second and thought, are these sites genuine?
Let’s see what are Google Ads, are Google Ads safe, how threat actors abuse Google Ads, tips to spot fake google ads, and finally, we will also see how you should protect yourselves from fake Google Ads.
Google ads is an online advertising platform that helps to improve business by increasing customer reach and helps companies to achieve their marketing goals. It also helps in increasing traffic to your website and raising awareness of products. Google ads are developed by google. Google Ads allows advertisers to display quick advertisements, all services offered, product listings, short videos, and much more on their websites.
Google ads often appear on most websites. They can be above or below search results. Google ads can be displayed in the google search engines and also on mobiles, non-search sites, etc. There are wide varieties of google ads, search ads, Local service ads, google shopping ads, etc.
How to Spot Fake Google Ads and Protect Yourselves From Fake Google Ads
Google ads can be very useful, especially when we are in search of any products and google recommends the best products on our visiting pages. But are all those google ads safe? Let’s see how threat actors abuse Google Ads.
Threat actors use Google ads to spread malware by pretending as legitimate software. So many popular software is targeted by attackers, including Grammarly, MSI Afterburner, Slack, Dash Lane, Malwarebytes, OBS, Ring, AnyDesk, Libre Office, TeamViewer, Thunderbird, Brave, etc. Check out this AnyDesk Malvertising Campaign as an example that came to light in Mid of 2021. The threat actors clone the original website to impersonate legitimate software.
Google ads can be very useful, especially when we are in search of any products and google recommends the best products on our visiting pages. But are all those google ads safe? Let’s see how google ads are exploited by threat actors.
The attack method used here is known as typosquatting, which means creating a fake website and naming the domain in such a way it resembles the original domain name. The attackers can use so many permutation combinations to create such domain names that will have small typos, which upon a single look, seem legitimate. For example, the original domain is ‘facebook.com,’ and attackers can create a fake domain with the name ‘faceb00k.com’. Here the attacker has replaced the alphabet ‘o’ with ‘zero.’
Grammarly is a famous software used by millions of people to help in improving spelling and grammar errors in English, there was a google ads scam targeting Grammarly in November 2022, and we will discuss the technical details of how this happened.
The original website of Grammarly is ‘grammarly.com.’ The threat actor creates a domain ‘grammalry[.]org’ which, upon a direct visit, will take you to an advertisement by “Christian Heating & Air Conditioning,” and the site contains no details regarding the original Grammarly website, nor looks suspicious.
An image of fake Google Ad
But, if the user is clicking on the promoted google ad search results for the above domain thinking it to be a legitimate site (because of the domain name ‘grammalry[.]org’), the user will be forwarded to the phishing page in the domain name ‘gramm-arly[.]com’. When a google ad is clicked, it generates a unique click id which is known as gclid or Google’s click ID, this id is valid only once, which is checked by the threat actor. If the gclid is valid, the threat actor checks for other parameters like the geolocation of the visitor, user agent, etc.
Once the attacker does this forwarding to the phishing site, the visitor can never see the “masquerAd” site ‘grammalry[.]org’ (Christian Heating & Air Conditioning) but only the phishing page, which exactly looks like the genuine Grammarly website.
Attack workflow (Source: Guardio labs)
This can make us wonder if this is a phishing site and why google is not taking any action on it, and the ads are promoted. This is because the threat actor creates a benign site (in the above case, ‘grammalry[.]org’) that will be promoted with the keyword, and it will be presented as a valid site in the eyes of a policy enforcer and crawlers visiting the site. Still, when these ‘disguised’ sites are visited by targeted users (people who actually click on the promoted ads), the server will immediately forward them to the rouge phishing site where they download malicious payloads.
What actually happens when the user clicks a fake ad (credits: Guardio labs)
Some examples of such cases where unrelated websites were created to mask the phishing activity are shown below.
Examples of masquerade sites (Image source: Guardio labs)
Examples of masquerade sites (Image source: Guardio labs)
These techniques make the work of attackers easy as they don’t have to search for a target as google itself promotes their ads and gets the victims. Thus, the attackers can put more effort into building their malicious payload. For Grammarly, the payload was not a simple stealer. It was a Raccoon Stealer Variant that could not be detected with simple security mechanisms. Some of their features include
The malware is downloaded along with the legitimate Grammarly software, which makes it less noticeable.
Bloated files- the executable file will be of large size by filling with bloated zeroed files just to make it difficult for security tools to detect.
Periodically changing the payload.
This is how threat actors abuse Google Ads to deliver malware that leads to further exploitation.
Google ads are ubiquitous and unavoidable. If you use Google and the internet, you should learn how to cope with such Malvertising techniques. We created this section to let you know some of the tips to spot fake Google Ads that help you protect your data on the internet.
Cross-check the URL of the site. If you are downloading or purchasing anything from a page redirected from ads, it is always better to search for that site separately and verify if it is legitimate.
Always inspect the page you have landed on after clicking the ad and check on the overall website quality and the ‘about us’ section. We can also check for social media handles. If these sections have spelling errors or any other red flags, try avoiding such sites.
Be very suspicious about products that are hard to find. Scammers can easily target desperate victims.
Avoid any kind of unbelievable offers which pops up in google ads.
Avoid ads that show any traces of adult content, as this is the best way of luring the victims.
Attackers are becoming much more creative as technology grows, and some basic security practices can always help us from falling into their trap. Human error is the reason behind 88% percent of security breaches in the world. Let’s see some of the best practices that help you learn how you should protect yourselves from fake Google ads.
While browsing for a service, do not click on the first popped-up result if it’s a promoted ad. Usually, the legitimate site will be the one following the ads.
Before clicking on any site, cross-check the URL for any typos.
Do not provide sensitive information (card details, social security number, etc.) in a hurry, always pause and verify if you are giving your details in the correct place.
Bookmark the sites which you are often using.
So, after knowing how attackers can scam you by placing malicious ads, a question will come to our mind are google ads safe? We can never give a ‘yes’ or ‘no’ answer to this. The blind trust in google mostly creates the damage. A proper mindset of not trusting anything from the internet can save us most of the time.
I hope this article helped in understanding what Google Ads are, are Google Ads safe, how threat actors abuse Google Ads, tips to spot fake google ads, and finally, we will also see how you should protect yourselves from fake Google Ads. Thanks for reading this post. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
Aroma is a cybersecurity professional with more than four years of experience in the industry. She has a strong background in detecting and defending cyber-attacks and possesses multiple global certifications like eCTHPv2, CEH, and CTIA. She is a pet lover and, in her free time, enjoys spending time with her cat, cooking, and traveling. You can connect with her on LinkedIn.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.