Google continues to battle with cybercriminals working malicious advertisements on its search platform to trick folks into downloading booby-trapped copies of in style free software program purposes. The malicious advertisements, which seem above natural search outcomes and sometimes precede hyperlinks to authentic sources of the identical software program, could make trying to find software program on Google a dicey affair.
Google says preserving customers secure is a high precedence, and that the corporate has a group of 1000’s working across the clock to create and implement their abuse insurance policies. And by most accounts, the menace from dangerous advertisements resulting in backdoored software program has subsided considerably in comparison with a 12 months in the past.
However cybercrooks are consistently determining ingenious methods to fly beneath Google’s anti-abuse radar, and new examples of dangerous advertisements resulting in malware are nonetheless too widespread.
For instance, a Google search earlier this week for the free graphic design program FreeCAD produced the next consequence, which exhibits {that a} “Sponsored” advert on the high of the search outcomes is promoting the software program out there from freecad-us[.]org. Though this web site claims to be the official FreeCAD web site, that honor belongs to the consequence instantly beneath — the authentic freecad.org.

How do we all know freecad-us[.]org is malicious? A assessment at DomainTools.com present this area is the latest (registered Jan. 19, 2024) of greater than 200 domains on the Web tackle 93.190.143[.]252 which might be confusingly much like in style software program titles, together with dashlane-project[.]com, filezillasoft[.]com, keepermanager[.]com, and libreofficeproject[.]com.
A number of the domains at this Netherlands host look like little greater than software program assessment web sites that steal content material from established info sources within the IT world, together with Gartner, PCWorld, Slashdot and TechRadar.
Different domains at 93.190.143[.]252 do serve precise software program downloads, however none of them are prone to be malicious if one visits the websites by direct navigation. If one visits openai-project[.]org and downloads a replica of the favored Home windows desktop administration utility Rainmeter, for instance, the file that’s downloaded has the identical precise file signature as the actual Rainmeter installer out there from rainmeter.com.
However that is solely a ruse, says Tom Hegel, principal menace researcher on the safety agency Sentinel One. Hegel has been monitoring these malicious domains for greater than a 12 months, and he mentioned the seemingly benign software program obtain websites will periodically flip evil, swapping out authentic copies of in style software program titles with backdoored variations that can permit cybercriminals to remotely commander the programs.
“They’re utilizing automation to tug in faux content material, and so they’re rotating out and in of internet hosting malware,” Hegel mentioned, noting that the malicious downloads could solely be provided to guests who come from particular geographic areas, like the US. “Within the malicious advert campaigns we’ve seen tied to this group, they’d wait till the domains acquire legitimacy on the major search engines, after which flip the web page for a day or so after which flip again.”
In February 2023, Hegel co-authored a report on this similar community, which Sentinel One has dubbed MalVirt (a play on “malvertising”). They concluded that the surge in malicious advertisements spoofing varied software program merchandise was instantly liable for a surge in malware infections from infostealer trojans like IcedID, Redline Stealer, Formbook and AuroraStealer.
Hegel famous that the spike in malicious software-themed advertisements got here not lengthy after Microsoft began blocking by default Workplace macros in paperwork downloaded from the Web. He mentioned the quantity of the present malicious advert campaigns from this group seems to be comparatively low in comparison with a 12 months in the past.
“It seems to be similar marketing campaign persevering with,” Hegel mentioned. “Final January, each Google seek for ‘Autocad’ led to one thing dangerous. Now, it’s like they’re paying Google to get one out of each dozen of searches. My guess it’s nonetheless persevering with due to the up-and-down [of the] domains internet hosting malware after which wanting authentic.”
A number of of the web sites at this Netherlands host (93.190.143[.]252) are presently blocked by Google’s Safebrowsing know-how, and labeled with a conspicuous pink warning saying the web site will attempt to foist malware on guests who ignore the warning and proceed.
However it stays a thriller why Google has not equally blocked extra the 240+ different domains at this similar host, or else eliminated them from its search index completely. Particularly contemplating there may be nothing else however these domains hosted at that Netherlands IP tackle, and since they’ve all remained at that tackle for the previous 12 months.
In response to questions from KrebsOnSecurity, Google mentioned sustaining a secure advertisements ecosystem and preserving malware off of its platforms is a precedence throughout Google.
“Dangerous actors typically make use of refined measures to hide their identities and evade our insurance policies and enforcement, typically exhibiting Google one factor and customers one thing else,” Google mentioned in a written assertion. “We’ve reviewed the advertisements in query, eliminated those who violated our insurance policies, and suspended the related accounts. We’ll proceed to watch and apply our protections.”
Google says it eliminated 5.2 billion advertisements in 2022, and restricted greater than 4.3 billion advertisements and suspended over 6.7 million advertiser accounts. The corporate’s newest advert security report says Google in 2022 blocked or eliminated 1.36 billion commercials for violating its abuse insurance policies.
A number of the domains referenced on this story had been included in Sentinel One’s February 2023 report, however dozens extra have been added since, corresponding to these spoofing the official obtain websites for Corel Draw, Github Desktop, Roboform and Teamviewer.
This October 2023 report on the FreeCAD person discussion board got here from a person who reported downloading a replica of the software program from freecadsoft[.]com after seeing the location promoted on the high of a Google search consequence for “freecad.” Virtually a month later, one other FreeCAD person reported getting stung by the identical rip-off.
“This obtained me,” FreeCAD discussion board person “Matterform” wrote on Nov. 19, 2023. “Please go away a report with Google so it could flag it. They paid Google for sponsored posts.”
Sentinel One’s report didn’t delve into the “who” behind this ongoing MalVirt marketing campaign, and there are valuable few clues that time to attribution. All the domains in query had been registered by webnic.cc, and a number of other of them show a placeholder web page saying the location is prepared for content material. Viewing the HTML supply of those placeholder pages exhibits most of the hidden feedback within the code are in Cyrillic.
Making an attempt to trace the crooks utilizing Google’s Advert Transparency instruments didn’t lead far. The advert transparency document for the malicious advert that includes freecad-us[.]org (within the screenshot above) exhibits that the promoting account used to pay for the advert has solely run one earlier advert by Google search: It marketed a marriage pictures web site in New Zealand.
The obvious proprietor of that pictures web site didn’t reply to requests for remark, however it’s additionally seemingly his Google promoting account was hacked and used to run these malicious advertisements.