Malvertising & SEO poisoning

Summary

Attackers are distributing malicious links using paid ads (aka. malvertising) on search engines like Google and social media platforms, as well as conducting SEO poisoning attacks to index their malicious pages on search engines.

Malvertising takes advantage of the fact that paid ads can be taken out against specific search terms with minimal checks, creating a watering hole-style attack where users searching for a specific term will be delivered a malicious link at the top of their search feed.

The attacker designs an ad that looks as similar to a legitimate ad as possible and can often appear above the legitimate ads for relevant products. When combined with techniques like rentable subdomains, this makes for the creation of authentic-looking links without many of the usual indicators of a phishing link (e.g. suspicious domain, unusual characters, or incorrect spelling).

SEO poisoning is a little more convoluted, but can be achieved using malicious tools like Hacklink to purchase access to thousands of compromised websites and inject malicious code designed to manipulate search engine algorithms.

This method of link delivery has a number of advantages over traditional email-based phishing:

  • The attacker does not have to acquire and build up the reputation for email accounts in order to deliver the link to victims.
  • Users trained to suspect phishing links delivered via email are often unsuspecting of malicious ads — particularly those ranking at the top of their search results.

While search engines offering paid search (e.g. Google, Bing, etc.) claim to perform checks on the content being advertised, malicious ads have been observed running for extended periods of time before being taken down.

The introduction of AI overviews is also changing the experience for users, where ads may appear above, within, or below the AI-generated section at the top of a search — further masking the fraudulent nature of the link.

Examples