Full-service Poseidon info stealer pushed by "advertiser identity verified by Google."
Mac malware that steals passwords, cryptocurrency wallets, and other sensitive data has been spotted circulating through Google ads, making it at least the second time in as many months the widely used ad platform has been abused to infect web surfers.
Like most other large advertising networks, Google Ads regularly serves malicious content that isn’t taken down until third parties have notified the company. Google Ads takes no responsibility for any damage that may result from these oversights. The company said in an email it removes malicious ads once it learns of them and suspends the advertiser and has done so in this case.
People who want to install software advertised online should seek out the official download site rather than relying on the site linked in the ad. They should also be wary of any instructions that direct Mac users to install apps through the right-click method mentioned earlier. The Malwarebytes post provides indicators of compromise people can use to determine if they’ve been targeted.
We’re just going to put this extra window on your car, and if thieves find a way to use our window to break into your car, it’s not our fault your shit got stolen.
With even the FBI recommending adblockers maybe ads aren't the thing we should prop up our economy with. They don't work, people hate them, and now even passively ignoring them isn't an option. But I don't know if the world can operate on the Patreon model.
On a bigger scale, I think it's all wasted money. Maybe its the autism, but the more I see a company name, any company name, the less I want it in my house.
all the more reason to use an adblocker... and a script blocker if you don't mind the extra clicks to get a whitelist going or to temporarily allow them somewhere.
Way too many people still don't understand that this is an essential part of the security equation. Many sites execute 10+ scripts, many of which are doing who the fuck knows what, and said sites typically only need like 1 to 3ish allowed to function.
Sure it's inconvenient compared to not doing anything, but it's mostly front loaded inconvenience. Once you get things dialed in for frequently used sites, and learn to tell at a glance what needs to be allowed, its really not much hassle at all tbh.
Are there shared whitelists? It seems like something that isn’t really practical without them. I’m a web developer who has never served one ad but the front-end tools now basically export all JavaScript. You’d probably just get a blank page on any site made recently that’s more complex than a portfolio/resume page.
Larger sites cater towards scriptless web for accessibility requirements.
Smaller sites don't need SPA, so will most likely work to some degree.
The better (not necessarily bigger) blog systems will use scripting for fancy things, but will have fallbacks and will still work.
It's the middle tier web-app (and sites that want to be a web app but have no reason to be) that will run SPA without any fallback. You know, the ones that want to send notifications and know your location and all that fun stuff.
I absolutely install stuff that doesn't have a signature verified by Apple, but you should be damn sure you know what you're installing before bypassing that security.
Ensure you have multiple layers of ad blocking. A winning combination blocks first at the DNS level, then at the browser level, and finally at the element level.
(Hyperbole) I’m shocked! I have been informed for decades, usually at high levels of snootiness, that Macs don’t have viruses unlike those pathetic other operating systems…
Digging further into the ad shows that it was purchased by an entity called Coles & Co, an advertiser identity Google claims to have verified.
The reason for this is to bypass a macOS security mechanism that prevents apps from being installed unless they’re digitally signed by a developer Apple has vetted.
The address happens to host the control panel for Poseidon, the name of a stealer actively sold in criminal markets.
The discovery comes a month after Malwarebytes identified a separate batch of Google ads pushing a fake version of Arc for Windows.
Like most other large advertising networks, Google Ads regularly serves malicious content that isn’t taken down until third parties have notified the company.
They should also be wary of any instructions that direct Mac users to install apps through the right-click method mentioned earlier.
The original article contains 534 words, the summary contains 138 words. Saved 74%. I'm a bot and I'm open source!