#malvertising

[ follow ]
Information security
fromThe Hacker News
1 day ago

Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts

Fake "Meta Verified" browser extensions distributed via malvertising steal Facebook session cookies and account data, enabling resale and further fraudulent ad campaigns.
Information security
fromThe Hacker News
4 days ago

GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms

Malvertising via manipulated GitHub commit URLs and paid search ads delivers a GPU-gated MSI installer that evades sandboxes and targets Western European IT firms.
Information security
fromLifehacker
1 week ago

This Android Malware Is Spreading Through Facebook Ads

Customize Google searches and add trusted sources like Lifehacker; beware Facebook malvertising delivering Brokewell Android spyware via cloned TradingView ads.
Information security
fromThe Hacker News
1 week ago

Cybercriminals Exploit X's Grok AI to Bypass Ad Protections and Spread Malware to Millions

Cybercriminals use X's Grok AI to expose malicious links via unscanned "From:" metadata in promoted videos, bypassing malvertising protections.
fromSecuritymagazine
2 weeks ago

Malicious Actors Spread Malware Via Meta's Advertising System

Bitdefender warns that a Meta malvertising campaign has expanded to Android phones. The research discovered malicious ads that offer a free TradingView Premium app for Android. Rather than leading users to a legitimate software, however, these ads take victims to a sophisticated crypto-stealing trojan, which the research as "an evolved version of the Brokewell malware." The research's most recent analysis revealed the campaign remains active and has leveraged at least 75 malicious ads since mid-July.
Information security
Information security
fromThe Hacker News
2 weeks ago

TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies

A malvertising campaign distributes a trojanized AppSuite PDF Editor that installs the TamperedChef information stealer and establishes persistence via Windows Registry.
fromThe Hacker News
2 months ago

SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools

Upon execution, a backdoor known as Oyster/Broomstick is installed. Persistence is established by creating a scheduled task that runs every three minutes, executing a malicious DLL (twain_96.dll) via rundll32.exe using the DllRegisterServer export.
Privacy technologies
[ Load more ]