markers = friend:0rcc6m5ozfe= flower:yug23tfkeuu= happy birthday wishes, simple:v0a9eaicorc= easy:zrgndj7ncki= mehendi design, easy:ovhdv5spv4w= cute minecraft house, sketch:cvby8labucy= swami vivekananda, aesthetic:vkd5equoiyi= bio for instagram, simple:w9ov9azz2wa= light wallpapers, wallpaper:wzrnlrtqvag= snowboard, high resolution:2wuyjtaajpw= blue background, bad boy:uhewe39qune= handsome anime boy, art:flotxgkkxj8= jailer, color:mffnueuoskc= bob esponja dibujo, summer:_h_oioemxs8= nail designs 2023, background:smvdqnxfnps= image, printable:ptqdkfycxy4= calendar template, love:f07apw120zs= good morning image, desktop:wwxe7narr8e= one piece wallpaper 4k, drawing:wlfjqxf8ajo= soccer ball, love:-grys0go8qu= good night gif, printable:s3k90khjhma= number 7, logo:i4qki5ltgkk= cruz azul, interior:uaudc3pejws= jeep rubicon, clipart:kr96g0qyds4= jack o lantern, silhouette:f6h2vtaj_ly= person, cute:ivfieodd0a4= demon slayer wallpaper, drawing:xiqse3daslw= basic simple floor plan, easy:dbjl5n8zg-a= watercolor drawing, short:fsvnw-qvsqq= green dress, wallpaper:gekkvb1i6oi= joey jordison, wallpaper:kyxxzy23pgs= love, girl:g81gelj1oro= discord pfp, boy:qo9ebjpfqju= anime drawings, drawing:vusc4acxkr0= guitar, free printable:hdorg3kuexi= printable calendar 2024, logo:i5fzghtjllo= sprint, logo:ccbq9q38f7y= car stickers, interior:1k_4hpu_ggy= id buzz, drawing:2ltgvx8vq0i= ferret, drawing:pxrl_s_b2vq= dogman, printable:pxsxiedyj2c= number 10, small:ckqzbwqfp8e= tattoo ideas, anime:4fktohgni8e= para dibujar, baby:nb9bhokzclu= egg, easy:piy5gbe23w4= water pollution, logo:nmztpxl2vpi= imo, wallpaper:jh7ihx1sf2u= real madrid, girl:kl1hnuiv1qu= anime drawing, background:c_dct4d6_wy= star wars wallpaper, clipart:rv1bmn21eta= tree, logo:--br5dni-fu= black panther, gamma blue:jtv8_kcjbnm= jordan 11, wallpaper:sls2yf9zhnc= power chainsaw man, cool:m-rw4r2o-c4= tyreek hill wallpaper, laptop:jgh-3xi30ga= y2k wallpaper, easy:1evv4mwcoco= clouds drawing, aesthetic:0wvdmhraubm= journal, drawing:ogqfvddk98a= uncle sam, wallpaper:p8bexdyro4g= nirvana, free printable:e_vivu9u8kw= habit tracker, interior:_wt_p8xho_u= chevy colorado, clipart:gmcy_hkauie= computer mouse, logo:duntjzuopi0= oregon ducks football, love:2hylaf2259k= couple wallpaper, logo:4egdjhehkiy= sun bum, papa love: papa to icha ero shitai musume-tachi to hitotsu yane no shita de, art:aogsvlbm18c= easy drawing, wallpaper:bmkde9sd14k= preppy, simple:he4a732wuhu= main hall modern tv unit design, background:b-_o7d4xysa= bible, anime:fwz8vnzp1hk= doraemon, tattoo:oot2nczowya= paris jackson, wallpaper:alfkml05yvm= football players, art:jvrl3auuhpy= golden ratio, wallpaper:qii3efpaek8= fortnite gif, cute:wxjpnf-4sdo= rock painting, flower:yn3vfbaa9-4= violets, drawing:mvs9zl-sriq= barbie, aesthetic:byd2j7hlyfy= phone wallpaper, drawing:znnauq4mcdm= anime:eookzxwgqz0= dog, printable:iz1av1uawe0= transformers coloring pages, easy:3rgbruczobg= dog, clipart:imyjcpbs0qy= lacrosse, animated:-qbl_na_br4= wednesday, hd wallpaper:yeg7rspt4-e= fondo de pantalla, cool:pzcjo9-wnmu= naruto wallpaper 4k, easy:tnqbt-yd66y= rongali, cute:cncyfo63mtq= snowman, clipart:9syrscuqzfm= dad, desktop:wekeeg9ummu= best wallpaper, wallpaper:ty_ykip8fac= spongebob, aesthetic:w3ny0mbvrpq= space, baby:3xnnkztkcd8= krishna photo, anime:kt8iwcs-0mo= baki hanma, wallpaper:d_tq8qn9z0i= vini jr, drawing:ngy_haoz3xi= ja morant, free printable:ugczhsmdb6g= christmas tree coloring page, cute:_mibpkuqkuu= my melody wallpaper, clipart:xg1xesyv184= angel wings, aesthetic:iwbfi5ucmgc= cinnamoroll wallpaper, wallpaper:s8b8cnlafkc= cinnamoroll, drawing:dbxxzvzu4gi= the flash, map:fc8cnbydgje= st kitts, drawing:zmhayysozyo= naruto uzumaki, wallpaper:uthepuhevmy= rose, purple:foa0uani_w8= iphone 14 pro max colors, map:tzvevouq8ro= las vegas strip, beautiful:g6j-lsnymkw= portugal, cute:gu4oih45rlk= best profile picture, logo:587ki2pf_fy= michelin tires, simple:z9x9rh09jxk= bacteriophage diagram, wallpaper:csp0luyguvy= aaliyah, free printable:k2tedkccoqm= weekly calendar printable, logo:27rcpi-rw3i= buccaneers, wallpaper:7tuhed5xm2m= flowers background, red:fbsbiadtrvo= circle, transparent:7ntb2lwq4bo= graduation cap, cute:7mxfjkgtrwm= dumbo octopus, clipart:-vr7vbhljcw= skiing, modern:dixapiyk3uc= kitchen design, easy:w_6ixsesole= painting on canvas, girl:9gtw8wtpvmg= sketch, logo:zad5r6gprw4= nebraska football, anime:bdxtwklmxyi= pinterest, male:g6vrsv6qkms= chest tattoo design, girl:sylkc2eg4bi= easy drawing, pink:6roi0igu4sg= dunks, easy:p2jvmwbf0yi= face paint, baby:5dizrd-icdi= thrush, sketch:pu06a-8zhjk= drawing easy, beautiful:yixit-s6oz8= flower wallpaper, logo:db4q-no8kh4= olympics, design:td7txrgabds= mind map ideas, custom:a7xsy9hdpdm= air force, wallpaper:qpz7_bgy1dw= tokyo revengers, high resolution:puwo4jlkmkg= aws logo, flower:ebzpjwxuzsy= butterfly coloring pages, cute:kb3jxgl8yte= good morning

Scammers threaten users with fake Google Ads

Cybercriminals always search for the most effective ways to launch new cyber threats and attacks or snatch precious data. This time, they use fake ads to redirect unsuspecting users to phishing sites and distribute ransomware, spyware, and malware infections.

Hackers must use their wits and cunning to develop new strategies to launch malicious attacks on unsuspecting internet users. This latest strategy is the most dangerous information-stealing tactic yet.

Malware spreading via Google Ads

Cybercriminals have found a way to harness the power of Google Ads to entice their victims to follow their links to data-snatching malicious software called the Rhadamanthys malware. A recent report indicates that this new malware strain has been running rampant all over the internet.

It sneakily redirects users to various phishing landing destinations. However, that’s not the end of it. In addition to phishing attacks, this intelligent malware uses spam emails to spread the infection via malicious PDF files that notify victims about unpaid financial statements.

The malware works in two ways: it uses fake Google Ads to entice internet users to download malicious software while targeting businesses with spam emails.

Using Google to distribute malware

When internet users turn to the Google search engine, Google Ads is the first thing they see in the search results. These ads typically appear above the organic search results.

READ MORE  How Lax Cyber Security Can Cripple Your Business

How the search engine displays ads gives hackers the advantage to distribute malware infection through ad campaigns because they know many internet users will choose the first three results after doing a search query.

They also created various phishing websites that mimic top-rated software solutions such as Bluestack and Zoom to target as many internet users as possible and get them to download malware without being aware of the infection.

Unsuspecting internet users think they’ve downloaded a helpful tool while being redirected to a software’s official landing page. However, the malware transfers them to one of the phishing web pages while stealing their data along the way.

These phishing websites are so true to the originals that they even use fonts and logos of popular brands to convince the user that they’re genuine. Even the installer files look legit. However, instead of installing a popular software tool, you get malware infection wreaking havoc on your systems.

The malware targets all sorts of data

Rhadamanthys is a data-stealer by design, meaning it captures as much data from the target audience as possible. Once it gathers enough information, it transfers it to a hacker-controlled command and control (C&C) server.

READ MORE  Top 7 Uses Of Ready Mix Concrete In Construction

The malware can gather any type of data:

  • Windows system information from desktop computers, such as CPU and RAM data, OS version, username, computer name, etc.
  • Browser-related information like browsing history, login credentials, auto-fills, cookies, bookmarks, and other browser-related files on top browsers like Brave, Chrome, Firefox, and Microsoft Edge.
  • Crypto wallet credentials and browser extensions.
  • Email and FTP clients.
  • Messaging apps.
  • Any program running on the target’s operating system.

Cybercriminals could easily access any files stored in a browser using the malware to accomplish their malicious goals. For example, most internet users store their account credentials and passwords in a browser and use them to access their social media or bank accounts.

The malware could steal those files and allow hackers to perform any action on the targeted victim. The Rhadamanthys malware can steal crypto credentials, emails, passwords, and any other information available, with no exception.

From messaging apps like Telegram and password managers to crypto wallets and email clients, no internet user is safe.

As that’s not enough, Rhadamanthys can also execute identity theft and snatch any type of personal or corporate data without precedence.

READ MORE  A closer look at the technology behind online gambling platforms

Protect yourself from online threats

The best advice we can give you is to check every link before clicking and avoid downloading shady software if possible. No matter your tech-savvy knowledge or what type of cybersecurity you’re using, cybercriminals will always find a way around your measures.

Keep that in mind every time you’re about to click on an online ad, as it might be a trick to lure you into a malware scam and steal your data. You can also prefer organic search results, which are far more difficult to infiltrate.

Install a high-end antivirus program on all your systems, use anti-malware protection, and avoid using public Wi-Fi connections. If you must use public Wi-Fi, download VPN apps and connect to secure servers. It ensures that all your online activities happen via secure hotspots. Furthermore, a Virtual Private Network might have private DNS, making you more immune to redirects.

Mac users should install the latest Mac cybersecurity solutions to ensure maximum security levels. Apple users will also succumb to the Rhadamanthys malware-as-a-service as hackers will stop at nothing to see their money’s worth.

Now, this innovative data-stealer is among the most dangerous cyber threats the digital world has ever seen.

Back to top button