WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – Threat Actors Infecting Victims Via Ads on Google Search
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Threat Actors Infecting Victims Via Ads on Google Search

Author: Alec Davison

Created: Thursday, January 19, 2023 - 19:17

Categories: Cybersecurity

To improve the chances of infecting more victims, threat actors are increasingly exploiting the Google Ads platform to push malicious downloads and spread malware via search results. The FBI warned about this activity in a public service announcement late last month, stating that cyber criminals are exploiting search engine advertisements to impersonate brands and direct users to malicious sites that host ransomware and steal login credentials and other financial data. Likewise, according to a new report by HP Wolf Security, over the last two months the company observed “a significant increase in malware distributed through malvertising, with multiple threat actors currently using this technique.” Many of the malicious ads target users looking to download popular software such as Audacity, Notepad++, Microsoft Teams, Discord, Microsoft OneNote, among others. The malicious ads are typically the first link users see when searching for software on Google and point to a fake URL (URL hijacking) domain that appears to be the original software provider’s page. To defend against this activity, members can utilize a reputable ad-blocker which are free common extensions in most web browsers. Read more at HelpNetSecurity or access the full report at HP Wolf Security here.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar