Saturday, April 12, 2025
HomeCyber AttackHackers Abuse Google Search Ads to Deploy Bonanza Malware

Hackers Abuse Google Search Ads to Deploy Bonanza Malware

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads.

The hackers are taking advantage of the search engine’s advertising mechanism to spread the malicious software, putting unsuspecting users at risk of cyber attacks.

This underhanded technique highlights the need for increased vigilance and caution when browsing the internet, particularly when clicking on ads.

- Advertisement - Google News

Hackers abuse Google Search Ads to deploy malware because it allows them to reach a wide audience quickly. 

By disguising malicious links as legitimate ads, they can trick users into clicking on them, leading to malware downloads or phishing attempts.

Additionally, Google’s vast user base offers a broad target audience for their attacks. Cybersecurity researchers at Malwarebytes recently identified that hackers are actively abusing Google Search Ads to deploy “Bonanza” malware.

Dynamic Search Ads Delivers Bonanza

Malvertising often stems from injected or intentionally created ads. But, recently, accidental malvertising occurred due to two key factors:- 

  • Compromised website
  • Google Dynamic Search Ads

Without the site owner’s knowledge, a rogue ad for Python developers led to a hacked page, offering the application for download but installing over a dozen malware pieces.

A wedding planning website with customer testimonials got injected with malware and was found to be changing titles and adding overlays promoting software serial keys, like Pycharm.

Hackers Abuse Google Search Ads
PyCharm Serial Key (Source – Malwarebytes)

Google’s Dynamic Search Ads (DSA) auto-generate ads from website content, convenient for advertisers but susceptible to abuse if the site’s content is altered without the owner’s knowledge, leading to misleading ads.

Hackers Abuse Google Search Ads
Dynamic Search Ads (Source – Malwarebytes)

Returning to the investigation’s origin, a Google search for ‘pycharm’ displayed an ad with a mismatch between its title (developer software) and description (wedding planning).

Google Ads created this ad from the hacked page, making the website owner an unwitting victim paying for the malicious ad.

Hackers Abuse Google Search Ads
Malicious Ad (Source – Malwarebytes)

Searchers clicking the ad’s headline for PyCharm could get redirected to the compromised page with the download link.

Running the installer floods your computer with malware, making it useless. Inexperienced criminals load software for commissions, but it’s not a subtle attack.

This unusual incident may have gone unnoticed by the website hackers. Compromised sites are monetized in various ways, and detecting this is tricky, as the ads seem legit.

Recommendations

Here below, we have mentioned all the recommendations offered by the researchers:-

  • Stay cautious with ads. 
  • Don’t download cracked software. 
  • Regularly check the landing pages linked to your ads.
  • Secure your Google Ads account with 2FA to prevent unauthorized access and changes to your campaigns.
  • Keep up-to-date with the latest developments in online advertising and cybersecurity.
  • Configure email alerts for your Google Ads account to receive notifications of unusual activity or policy violations.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...