Phishing scams in my Google results? It’s more likely thank you think.
Phishing scams in my Google results? It’s more likely thank you think.

By James Vincent

The crypto world is full of dangers, with scammers lying in wait for newbies and novices. A recent report from security outfit Check Point Research highlights a potent form of attack: using Google Ads to direct users to fake crypto wallets. In its report, CPR said it has seen roughly half a million dollars siphoned off through these methods in just the last few days.

Here’s how the scam works. Attacker buys Google Ads in response to searches for popular crypto wallets (that’s the software used to store cryptocurrency, NFTs, and the like). CPR says it’s noticed scams targeting Phantom and MetaMask wallets, which are the most popular wallets for the Solana and Ethereum ecosystems.

When an unsuspecting user Googles “phantom,” the Google Ad result (which appears above actual search results) directs them to a phishing website that looks like the real thing. Then, one of two things happens: either the user enters their credentials which the attacker keeps. Or, much weirder, if they try to create a new wallet they’re told to use a recovery password which actually logs them into a wallet controlled by the attacker, not their own. “This means if they transfer any funds, the attacker will get that immediately,” says CPR.

The attackers use fake URLs to trick users into thinking they’re logging into their crypto wallets
As with other phishing scams, the fake sites are designed to look as similar as possible to the real ones. 

As with phishing scams more generally, the attackers rely on making their fake log-in pages look as much as possible like the real thing. CPR notes that they’ve seen attackers use fake URLs to trick users, directing them to phanton.app or phantonn.app, for example, instead of the correct phantom.app. The group has also seen similar phishing scams used to direct users to fake crypto currency exchanges, including PancakeSwap and UniSwap.

CPR’s researchers say they started noticing these scams after seeing crypto users complain about their losses on Reddit and other forums. They estimate that “at least half a million dollars” have been stolen over the past few days.

“I believe we’re at the advent of a new cyber crime trend, where scammers will use Google Search as a primary attack vector to reach crypto wallets, instead of traditionally phishing through email,” said CPR’s Oded Vanunu in a press statement. “The phishing websites where victims were directed to reflected meticulous copying and imitation of wallet brand messaging. And what’s most alarming is that multiple scammer groups are bidding for keywords on Google Ads, which is likely a signal of the success of these new phishing campaigns that are geared to heist crypto wallets.”

The group offers a few words of wisdom for users hoping to avoid these pitfalls, including never clicking on Google Ads results but instead looking at search results, and always checking the URL of the site you’re visiting.

Affiliate News Feeds

  • Hardware
  • Internet of Things
  • Networking
  • Industry News
  • Software

A new single board computer range offers developers flexibility and the option of custom hardware. The post OKdo partners with Radxa to deliver new ROCK SBCs appeared first on TechRepublic. [...]

Cybersecurity threats and attacks are on an upswing with no end in sight. It’s clear that organizations must do more to protect their data and employees. AMD and Microsoft have… [...]

The need to protect your Mac's data should prove no surprise, but there are many options beyond using iCloud and Time Machine. Here are several leading options, should you need… [...]

A new single board computer range offers developers flexibility and the option of custom hardware. The post OKdo partners with Radxa to deliver new ROCK SBCs appeared first on TechRepublic. [...]

Blockchain and edge computing can be a formidable combination in terms of power, scalability and versatility. The post How blockchain and edge computing can work together appeared first on TechRepublic. [...]

IoT use cases continue to grow as this report projects that the IoT-enabled asset tracking and monitoring market will witness exponential growth in the coming years. The post IoT-based asset… [...]

Jack Wallen shows you how to quickly get Samba shares up and running on any Linux distribution based on Red Hat Enterprise Linux. The post How to install and configure… [...]

Google Fiber hopes to expand its reach to deliver one of the fastest fiber networks to multiple U.S. communities. The post Google Fiber plots speedy multi-gig future appeared first on… [...]

Learn the basics of automation in Windows PowerShell for just $19.99 with this certification bundle. The post Automate Windows administration with PowerShell: Learn how in this training course appeared first… [...]

Cybersecurity threats and attacks are on an upswing with no end in sight. It’s clear that organizations must do more to protect their data and employees. AMD and Microsoft have… [...]

Professional risk factors into career decisions, and successful women need to encourage other women to accept the risks, says Accenture. The post Report finds women are declining CISO/CSO roles appeared… [...]

CompTIA finds tech investments will support innovation and recruitment, while Verizon Business reveals 31% of SMBs will cut tech investments. The post Two SMB reports reveal differing views on tech… [...]

Data observability tools allow you to monitor what is happening to your data. Here is a list of the top data observability tools of 2022. The post Best observability tools… [...]

Once you decide the default Auto Date table isn’t adequate, you can create one that fulfills your grouping and filtering requirements in Microsoft Power BI. The post How to create… [...]

Talend is one of the most popular tools for data quality. Get details on using Talend's tools for data profiling, cleaning, standardization, matching and deduplication. The post Data quality solutions… [...]