Friday, April 11, 2025
HomeSecurity NewsCoinhoarder Hackers Abused Google AdWords & Earned More than $50 Million via...

Coinhoarder Hackers Abused Google AdWords & Earned More than $50 Million via Bitcoin Phishing Campaign

Published on

SIEM as a Service

Follow Us on Google News

Ukraine Cyberpolice and Researchers from Cisco Talos uncovered a Bitcoin Phishing campaign that uses Google AdWords to find their victim. Attackers targeted specific geographic regions to earn millions of cryptocurrency from victims.

The campaign is very simple after the initial setup attackers purchased Google AdWords to poison search results and to steal cryptocurrencies from user wallets.

When users search with the keyword “blockchain” or “bitcoin wallet” the spoofed links that look legitimate appears at the top and servers the content in native language based on the location of victims. Here you find the complete list of phishing sites involved.

- Advertisement - Google News
Bitcoin Phishing

Also Read Russian Scientists arrested for using Secret Nuclear Weapons Lab Supercomputer to Mine Bitcoin

Researchers said the domain block-clain[.]info was used an initial gateway and then redirected to blockchalna[.]info which is the final page that resembles the original site. The attack works as follows.

Bitcoin Phishing - 1
Click & Enlarge for clear view
Ukraine Cyberpolice says “According to our approximate estimates, only from September to December 2017, using the above method, the intruders took possession of a 700-BTC crypt of foreign currency (at the time of writing this amount is equivalent to the US $ 5 million)”.

The Attackers targets the developing African countries where the local currencies are not so stable and also the countries whose first language is not English.

Cisco said “we have evidence the COINHOARDER group has been actively pilfering Bitcoin since at least 2015. Based on our findings associated with this syndicate, we estimate the COINHOARDER group to have netted over $50M dollars over the past three years”.

The Coinhoarder made heavy use of typosquatting and brand spoofing methods to make the domains more convincing, they also used international domain names appears as like English.

The Punycode (internationalized) version is on the left, the translated (homographic) version on the right:

xn--blockchan-d5a[.]com → blockchaìn[.]com
xn--blokchan-i2a[.]info → blokchaín[.]info

IOC’S – Bitcoin Phishing 

The following IP address is known to have been used in these phishing attacks:

91[.]220[.]101[.]11
91[.]220[.]101[.]109
91[.]220[.]101[.]106
91[.]220[.]101[.]104
91[.]220[.]101[.]111
91[.]220[.]101[.]112
91[.]220[.]101[.]113
91[.]220[.]101[.]115
91[.]220[.]101[.]117
91[.]220[.]101[.]141
91[.]220[.]101[.]48
91[.]220[.]101[.]115

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...

Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails

Clio is a cutting-edge, secure logging platform designed specifically for red team operations and...

Enhancing Satellite Security by Encrypting Video Data Directly on Payloads

The rapid expansion of low-Earth orbit (LEO) satellite constellations has underscored the need for...