Monday, April 28, 2025
HomeCyber Security NewsMicrosoft Advertisers Account Hacked Using Malicious Google Ads

Microsoft Advertisers Account Hacked Using Malicious Google Ads

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity experts have uncovered a sophisticated phishing campaign targeting Microsoft advertising accounts.

The attack, orchestrated through malicious Google Ads, aims to steal login credentials of users accessing Microsoft’s advertising platform.

This incident highlights the growing risk of malvertising, where cybercriminals exploit legitimate ad networks to deceive users.

- Advertisement - Google News

How the Attack Works

The phishing campaign leverages sponsored Google search results for terms like “Microsoft Ads” and “Bing Ads.”

A Google search for ‘microsoft ads’
A Google search for ‘microsoft ads’

While Microsoft does purchase ad space on Google to attract advertisers, threat actors have inserted fake sponsored links mimicking legitimate Microsoft domains.

These malicious ads bypassed Google’s security protocols, directing unsuspecting users to fraudulent login pages.

Upon clicking the malicious ad, users are redirected through a complex network of cloaking techniques.

The attackers differentiate genuine users from bots or web crawlers, directing suspicious traffic to harmless “white pages.”

Real users, however, are funneled through a Cloudflare verification checkpoint, which uses legitimate infrastructure to validate their authenticity.

Once verified, users face phishing pages designed to replicate Microsoft’s advertising login portals. These pages prompt users to reset passwords, inadvertently handing over sensitive information to the attackers.

Some phishing kits used in this campaign even attempt to bypass two-factor authentication (2FA), a troubling insight into the evolving sophistication of phishing tactics.

Network traffic for full redirection
Network traffic for full redirection

The Scope of the Attack

Evidence suggests this campaign may have been active for years, with links to domains hosted in Brazil and other regions.

According to the Malwarebytes report, Cybersecurity researchers identified a broad infrastructure supporting the phishing operation, pointing to a large-scale attack targeting advertisers on Microsoft and possibly other platforms like Google and Facebook.

The attackers used URLs mimicking Microsoft’s domains, with slight misspellings or substitutions, such as “ads.microsoftt[.]com” or “ads-mlcrosoft[.]com.”

Microsoft Advertising phishing page
Microsoft Advertising phishing page

The scale and persistence of the campaign indicate that significant resources have been invested, and the attack might only reveal the “tip of the iceberg.”

The attack comes as Microsoft’s advertising business, including Bing, experiences increasing competition from Google.

In 2023, Microsoft generated $12.2 billion from search and news advertising, a fraction of Google’s market dominance.

With malicious actors infiltrating a space already marked by rivalry, both companies face scrutiny over their security measures to protect advertisers. The incident underscores vulnerabilities in online advertising systems.

Google and Microsoft have been informed of the breaches, but the campaign raises concerns about the robustness of ad network security protocols and the risks they pose to users who trust these platforms.

Here are some key steps advertisers and users can take to stay safe:

  1. Verify URLs: Always double-check the website address for slight misspellings or inconsistencies before entering credentials.
  2. Be Cautious with 2FA Requests: While 2FA is essential, users must scrutinize all access requests to ensure they’re legitimate.
  3. Monitor Accounts Regularly: Watch for unauthorized activity or unexpected changes in account settings.
  4. Report Suspicious Ads: If encountering fraudulent ads, report them to the platform to help protect others.

This attack underscores the critical need for vigilance in digital advertising. As cybercriminals develop increasingly sophisticated tactics, businesses and users alike must adopt robust security practices.

While companies like Google and Microsoft work to enhance their defenses, staying educated and cautious remains one of the best lines of defense against such threats.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

CISA Alerts Users to Security Flaws in Planet Technology Network Products

The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...