reference4 = wallpaper:onnist5tmoi= man city,bangkok:oozgu3afbw0= thailand,music:jfqh0niwbhu= youtube,movie:aagsm4lvkqe= barbie,geography:iab75_6wu5u= map of africa,wallpaper:nx2rszccnjw= ana de armas,animated:lvl0xbmhzoy= grinch,grey:j-ibq9cnvty= french bulldog,wallpaper:y0nv0sjhznu= naruto,flag:otclzlhi3fe= france,city:32nco2sbnrs= rome,sport:h3vpudi_0yi= lucozade,cat:7y7rxh4mb3g= beluga,cool:uqgnyupxheo= pumpkin ideas,galaxy:zrepipnvytu= space,waterfall:h7todmdvpl0= rainforest,instagram:txpima__gm0= emma watson,instagram:iivx6rvlcgo= carol vorderman,printable:l7td367iuzq= bristol stool chart,doberman:tuve85jkx3w= rottweiler,clipart:eq5wrhpcrpk= penguin,drawing:rxvueq1xohe= pikachu,lace:zajsltunvbm= wedding dresses,cute:iogw0qxnahu= merry christmas,spyder:ghuo3u9u06e= audi r8,cute:gss-pfv3z2o= unicorn,beautiful:fc9bdwd6wsq= mountains,epic:3_jolno9cxu= fortnite,carving:poa5-_23hps= halloween pumpkin,colour:engppek7who= black,underwater:3u1qizs_9ra= sea,clipart:xm0ixlqtvvs= fox,pyramid:kupeikq0u0u= ancient egypt,skin:db7ghh9v_-i= welt,city:ictpv8cenhi= dortmund,puppy:kpmu60zvxa8= labradoodle,pink:em2bnbxphq8= implantation bleeding,easy:dccqbg1gxng= cute drawings,clipart:raya3c-uzqo= monkey,tokyo:uhyomgfkljy= japan,tattoo:ssnluox1jeq= birth flowers,templates:hzvpthnzua8= pumpkin faces,early stage:4ldeax60ryi= tongue cancer,moonwalk:8xjkzk6mccq= michael jackson,drawing:ic8dkh2jtsc= fire,somali:xah6pfbkb04= baati,light:qarz8iicrb4= blonde hair,medieval:rrvkg7kuzso= vikings,brown:fwka_ggfpim= implantation bleeding,printable:fqjiacrpfwc= calendar 2024,hand:ajsdafhf_wq= early scabies,instagram:rzkbxuyzvtc= lizzo,lyme disease:xvh4nw3hmhm= tick bite,greek mythology:pz8bxspldhs= aphrodite,drawing:yh2tog8wlhe= reindeer,cone:vzttg9zn1ym= ice cream,icon:ucpa_o2fj5k= person,drawing:inkzdtssqfq= cute,painting:bjiiic6ya0y= mona lisa,cub:hrydcrqx7am= tiger,summit:x1rrq-g4gbm= ben nevis,pink:gdxr6qp7qy0= wallpaper,interior:d55xymm7fgy= mercedes a class,cute:jdxitutj1wm= christmas drawing,princess cut:k8xxlnvcsuy= engagement rings,classic:0ng8z-i3wds= board games,drawing:9xokabjvskw= harry potter,transparent:vw_dnit5jaa= fire,scan:kxqjmbg2zcy= barcode,transparent background:xq-yflqzlae= linkedin logo,clipart:w0_zqrlbiey= viking,aesthetic:qv_vb5dq-mw= billie eilish,map:nmsulczj4io= peru,wallpaper:h3qy5h2kd-o= batman,english:5u6iexuy2dk= 6th kalma,weather:j6krqzl--zc= climate change,simple:vnxqib1zo1s= easy drawing,kawaii:opn35g1fieq= cinnamon roll,drawing:cuyvl6drpxk= spiderman,red:zmxs9c27vsq= curtains,now:mjw29ym6kui= celine dion,kfc:b7o8jsvnwci= gravy,mega:btn4nowj9g4= charizard,fnaf:ar82h2ngwdw= foxy,auckland:ft4bvyw_8oe= new zealand,city:fa47amjkrye= london,clipart:3fi9o0kpaqc= santa claus,pink:fb_0wd9js0o= flamingo,clip art:fdtqmxla1o8= baby yoda,art:0-1hjy2q1y8= tate modern,gold:umfl7yert6w= stars,free printable:hdorg3kuexi= 2024 calendar printable,cute:oayqkvrhx0w= shark,color:r7hvjmcjrbe= green,barcelona:7g3sprx-jho= spain,pixel art:t45fiovsujc= minecraft,movie:jbcmokp7nz0= matilda,original:gmxja2tjeqs= starry night,laugh:bbhobiwhjo4= memes,map:tcnch39riqo= london underground,beauty:fj4znsy9dsa= face mask,margot robbie:qduvc4bfkzu= wolf of wall street,iphone:ascrfi8q5dw= preppy wallpaper,drawing:wtpcchwhimi= tree,transparent:b-awjggwic4= snowflake,princess cut:ksgl0yhwqlq= engagement rings,princess cut:ypquot4-llq= engagement rings,beautiful:xdbufznebvg= women,baby:ud25ac7_sja= dog,drink:ix9b5ffsw-8= prime,green:wkejh-kd4me= tick,solve: 4x ^ 2 - 5x - 12 = 0,metal:yxaivuxyma4= rust,summer:zo9d4xwxd7s= sun,paphos:vg5h3ox7bks= cyprus,soup:mtpwvsq_cje= andy warhol,easy:buoq_psho6e= painting ideas,jenna ortega:vtaiunkdros= wednesday addams,luxury:bmab1dzyzhy= cars,life:0j8nvhgs2oc= quotes,painting:hbecsddjl6i= leonardo da vinci,c class:m3nbi49ep_o= mercedes benz,modern:oswoqwdsrye= mullet,fluffy:tja-5thpumu= cat,mansion:4ufwhkkcfis= house,logo:vuhahrjnrjk= canada goose,pulp fiction:smhqcnlnkgg= uma thurman,drawing:xp5pmetygu8= camel,photography:oyzm8o0wdms= nature,iphone:i4ihqiyve_m= cute christmas wallpaper,blue:n_vometldc4= french bulldog,clip art:l6nyalw4u8s= football,makeup:gris6qh5k-a= marilyn manson,high resolution:7jhfm95rryq= monopoly board,summer:fski0hktjkk= gel nails,messenger:cejiipammc8= facebook,printable:ir9da3spxxq= storyboard template,/wp-json/oembed/1.0/embed?url=https://www.google.com/search?q=,art:8d3vxybkwti= owl,drawing:j-4gl6tcz24= bat,full grown:jbwykevttls= french bulldog,wallpaper:fbecqasg9g8= grinch,cute:cqmxnv3rxsu= squishmallows,instagram:9y-gcyup5r8= mimi keene,early:578splgryfm= katie price,womens:1fivwi5upq8= canada goose coat,t rex:nvpzaqijnou= dinosaurs,basal:du7jtmdzvbo= skin cancer symptoms,girl:upwwfn8gun4= elf on the shelf,falling:w7k2ehma-zo= snow,partner:levriacmcqu= millie bright,beach:dj4lbuubcwe= summer,simple:xhsre9aqxhm= easy things to draw,full:o5lnvdleufe= surah rahman,scalp:1f9plxmtmay= ringworm,younger:_e6yclbdb_o= jennifer aniston,beach:xcc3kmziuwk= malibu,instagram:v-_ogcyjkmg= sydney sweeney,aesthetic:63yerlhbboc= christmas wallpaper iphone,animated:bg4opuaq3e8= light bulb,printable:dgoaegkusnw= easter eggs,easy:o0sd8fip9t0= skeleton face paint,short:s3pagwf862o= acrylic nails,colour:msobuvqeiuc= pink,cow:agadhy-l-qe= squishmallows,caramel:kfggq9a-cak= light brown hair,map:tjyuoauf8gw= vienna,cute:az9ymqlunfm= dragon,gaming:bhg73yaeg70= mouse,nike:2fgm5cumbse= football boots,taper:8lxhwr4ktv0= drop fade,logo:tbqfkrsuucq= rainbow friends,blue:uc_j1oslfmg= axolotl,wallpaper:3yrpmgvv7gg= jenna ortega

Scammers threaten users with fake Google Ads

Cybercriminals always search for the most effective ways to launch new cyber threats and attacks or snatch precious data. This time, they use fake ads to redirect unsuspecting users to phishing sites and distribute ransomware, spyware, and malware infections.

Hackers must use their wits and cunning to develop new strategies to launch malicious attacks on unsuspecting internet users. This latest strategy is the most dangerous information-stealing tactic yet.

Malware spreading via Google Ads

Cybercriminals have found a way to harness the power of Google Ads to entice their victims to follow their links to data-snatching malicious software called the Rhadamanthys malware. A recent report indicates that this new malware strain has been running rampant all over the internet.

It sneakily redirects users to various phishing landing destinations. However, that’s not the end of it. In addition to phishing attacks, this intelligent malware uses spam emails to spread the infection via malicious PDF files that notify victims about unpaid financial statements.

The malware works in two ways: it uses fake Google Ads to entice internet users to download malicious software while targeting businesses with spam emails.

Using Google to distribute malware

When internet users turn to the Google search engine, Google Ads is the first thing they see in the search results. These ads typically appear above the organic search results.

READ MORE  How Shopify App Development Services Can Help Your Business Grow?

How the search engine displays ads gives hackers the advantage to distribute malware infection through ad campaigns because they know many internet users will choose the first three results after doing a search query.

They also created various phishing websites that mimic top-rated software solutions such as Bluestack and Zoom to target as many internet users as possible and get them to download malware without being aware of the infection.

Unsuspecting internet users think they’ve downloaded a helpful tool while being redirected to a software’s official landing page. However, the malware transfers them to one of the phishing web pages while stealing their data along the way.

These phishing websites are so true to the originals that they even use fonts and logos of popular brands to convince the user that they’re genuine. Even the installer files look legit. However, instead of installing a popular software tool, you get malware infection wreaking havoc on your systems.

The malware targets all sorts of data

Rhadamanthys is a data-stealer by design, meaning it captures as much data from the target audience as possible. Once it gathers enough information, it transfers it to a hacker-controlled command and control (C&C) server.

READ MORE  Dive Into the Benefits of Email AI Assistants in Customer Service

The malware can gather any type of data:

  • Windows system information from desktop computers, such as CPU and RAM data, OS version, username, computer name, etc.
  • Browser-related information like browsing history, login credentials, auto-fills, cookies, bookmarks, and other browser-related files on top browsers like Brave, Chrome, Firefox, and Microsoft Edge.
  • Crypto wallet credentials and browser extensions.
  • Email and FTP clients.
  • Messaging apps.
  • Any program running on the target’s operating system.

Cybercriminals could easily access any files stored in a browser using the malware to accomplish their malicious goals. For example, most internet users store their account credentials and passwords in a browser and use them to access their social media or bank accounts.

The malware could steal those files and allow hackers to perform any action on the targeted victim. The Rhadamanthys malware can steal crypto credentials, emails, passwords, and any other information available, with no exception.

From messaging apps like Telegram and password managers to crypto wallets and email clients, no internet user is safe.

As that’s not enough, Rhadamanthys can also execute identity theft and snatch any type of personal or corporate data without precedence.

READ MORE  7 Best Noise Cancelling Apps For 2022

Protect yourself from online threats

The best advice we can give you is to check every link before clicking and avoid downloading shady software if possible. No matter your tech-savvy knowledge or what type of cybersecurity you’re using, cybercriminals will always find a way around your measures.

Keep that in mind every time you’re about to click on an online ad, as it might be a trick to lure you into a malware scam and steal your data. You can also prefer organic search results, which are far more difficult to infiltrate.

Install a high-end antivirus program on all your systems, use anti-malware protection, and avoid using public Wi-Fi connections. If you must use public Wi-Fi, download VPN apps and connect to secure servers. It ensures that all your online activities happen via secure hotspots. Furthermore, a Virtual Private Network might have private DNS, making you more immune to redirects.

Mac users should install the latest Mac cybersecurity solutions to ensure maximum security levels. Apple users will also succumb to the Rhadamanthys malware-as-a-service as hackers will stop at nothing to see their money’s worth.

Now, this innovative data-stealer is among the most dangerous cyber threats the digital world has ever seen.

Back to top button