Monday, March 31, 2025
Homecyber securityMalicious Google Ads Target DeepSeek Users to Spread Malware

Malicious Google Ads Target DeepSeek Users to Spread Malware

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity threats continue to evolve, with malicious actors exploiting popular platforms like Google Ads to spread malware.

Recently, a sophisticated campaign targeting DeepSeek users has been uncovered, highlighting the ongoing risks associated with sponsored search results.

The Threat Landscape

DeepSeek, a rising platform, has become a lure for cybercriminals who are using fake sponsored Google ads to trick unsuspecting users.

These ads are designed to mimic legitimate DeepSeek advertisements, making them difficult to distinguish from genuine ones.

Upon clicking the fake ads, users are redirected to a convincing but fake website, which prompts them to download a Trojan programmed in Microsoft Intermediate Language (MSIL).

Google Ads
 fake ad

This malware is detected by Malwarebytes’ AI module as Malware.AI.1323738514.

The success of these campaigns underscores the challenge Google faces in filtering out malicious ads from its sponsored search results.

Avoiding Malware Traps

To protect against such threats, users are advised to exercise caution when interacting with sponsored search results.

A primary recommendation is to avoid clicking on these ads altogether.

Additionally, users can verify the legitimacy of an advertiser by examining the URL and checking if the listed advertiser matches the brand owner.

According to the Report, Installing an ad-blocker can also help bypass sponsored ads, ensuring users only see organic search results.

Malwarebytes and similar cybersecurity tools play a crucial role in detecting and removing such threats, emphasizing the importance of robust antivirus software in today’s digital landscape.

According to MalwareBytes, this incident is part of a broader trend where cybercriminals exploit popular platforms and services to spread malware.

The use of fake CAPTCHAs in phishing campaigns, such as those targeting Booking.com, further illustrates the sophistication and diversity of modern cyber threats.

As technology advances, so do the tactics of malicious actors, making it essential for users to stay informed and equipped with the latest cybersecurity tools and best practices.

By understanding these risks and taking proactive measures, individuals can significantly reduce their exposure to malware and other cybersecurity threats.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Beware! A Fake Zoom Installer Drops BlackSuit Ransomware on Your Windows Systems

Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver...

Linux Distribution Nitrux3.9.1  Releaed – What’s New

Nitrux Linux, renowned for its innovative approach to desktop computing, has unveiled its latest...

Hackers Distributing Phishing Malware Via SVG Format To Bypass File Detection

Cybersecurity experts at the AhnLab Security Intelligence Center (ASEC) have uncovered a novel phishing...

CrushFTP Vulnerability Lets Hackers Bypass Security and Seize Server Control

A newly disclosed authentication bypass vulnerability (CVE-2025-2825) in CrushFTP file transfer software enables attackers...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Beware! A Fake Zoom Installer Drops BlackSuit Ransomware on Your Windows Systems

Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver...

Linux Distribution Nitrux3.9.1  Releaed – What’s New

Nitrux Linux, renowned for its innovative approach to desktop computing, has unveiled its latest...

Hackers Distributing Phishing Malware Via SVG Format To Bypass File Detection

Cybersecurity experts at the AhnLab Security Intelligence Center (ASEC) have uncovered a novel phishing...