Wednesday, May 14, 2025
HomeSecurity NewsCoinhoarder Hackers Abused Google AdWords & Earned More than $50 Million via...

Coinhoarder Hackers Abused Google AdWords & Earned More than $50 Million via Bitcoin Phishing Campaign

Published on

SIEM as a Service

Follow Us on Google News

Ukraine Cyberpolice and Researchers from Cisco Talos uncovered a Bitcoin Phishing campaign that uses Google AdWords to find their victim. Attackers targeted specific geographic regions to earn millions of cryptocurrency from victims.

The campaign is very simple after the initial setup attackers purchased Google AdWords to poison search results and to steal cryptocurrencies from user wallets.

When users search with the keyword “blockchain” or “bitcoin wallet” the spoofed links that look legitimate appears at the top and servers the content in native language based on the location of victims. Here you find the complete list of phishing sites involved.

- Advertisement - Google News
Bitcoin Phishing

Also Read Russian Scientists arrested for using Secret Nuclear Weapons Lab Supercomputer to Mine Bitcoin

Researchers said the domain block-clain[.]info was used an initial gateway and then redirected to blockchalna[.]info which is the final page that resembles the original site. The attack works as follows.

Bitcoin Phishing - 1
Click & Enlarge for clear view
Ukraine Cyberpolice says “According to our approximate estimates, only from September to December 2017, using the above method, the intruders took possession of a 700-BTC crypt of foreign currency (at the time of writing this amount is equivalent to the US $ 5 million)”.

The Attackers targets the developing African countries where the local currencies are not so stable and also the countries whose first language is not English.

Cisco said “we have evidence the COINHOARDER group has been actively pilfering Bitcoin since at least 2015. Based on our findings associated with this syndicate, we estimate the COINHOARDER group to have netted over $50M dollars over the past three years”.

The Coinhoarder made heavy use of typosquatting and brand spoofing methods to make the domains more convincing, they also used international domain names appears as like English.

The Punycode (internationalized) version is on the left, the translated (homographic) version on the right:

xn--blockchan-d5a[.]com → blockchaìn[.]com
xn--blokchan-i2a[.]info → blokchaín[.]info

IOC’S – Bitcoin Phishing 

The following IP address is known to have been used in these phishing attacks:

91[.]220[.]101[.]11
91[.]220[.]101[.]109
91[.]220[.]101[.]106
91[.]220[.]101[.]104
91[.]220[.]101[.]111
91[.]220[.]101[.]112
91[.]220[.]101[.]113
91[.]220[.]101[.]115
91[.]220[.]101[.]117
91[.]220[.]101[.]141
91[.]220[.]101[.]48
91[.]220[.]101[.]115

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...