Cyber Security News

Hackers Abusing Google Ads To Deliver Fakebat Malware

Cybersecurity researchers have uncovered a resurgence of the Fakebat malware loader being distributed through malicious Google Ads. After a months-long break, Fakebat has resurfaced, focusing on users who are looking for popular productivity software.

Malwarebytes detected a malicious Google ad impersonating Notion, a widely used productivity application.

The ad appeared at the top of search results and looked completely legitimate, with an official logo and website. However, clicking on it led users through a series of redirects before ultimately delivering the Fakebat malware.

Fake ads

Fakebat, also known as Eugenloader or PaykLoader, is a sophisticated loader-as-a-service (LaaS) malware that has been active since at least December 2022.

Managed Detection and Response Buyer’s Guide – Free Download (PDF)

It’s designed to download and execute various secondary payloads, including information stealers like IcedID, Lumma, and RedLine.

The malware’s distribution method exploits Google’s ad platform by using tracking templates to bypass detection, reads Malwarebytes report.

If the user is not an intended target, they are redirected to the legitimate website, making it difficult for Google to identify the malicious activity.

Once installed, Fakebat employs multiple stages of PowerShell scripts to evade detection and sandbox environments. The final payload in this campaign was identified as the LummaC2 Stealer.

This resurgence of Fakebat highlights the persistent threat of malvertising campaigns. Despite a recent decrease in such attacks, cybercriminals can quickly revert to these proven methods.

The incident underscores the ongoing challenge of brand impersonation in Google Ads, where built-in features can be exploited to create convincing fake advertisements.

Cybersecurity experts stress the importance of vigilance when clicking on search engine ads, even for well-known software. Users are advised to verify the authenticity of download sources and maintain up-to-date security software to protect against such threats.

The Fakebat campaign highlights that although malvertising fluctuates, it remains a crucial vector for malware distribution. As threat actors evolve their tactics, users, and platforms must remain alert to these sophisticated impersonation techniques.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Cyber Guardians: INE Security Champions Cybersecurity Training During National Physicians Week 2025

Cary, NC, March 24th, 2025, CyberNewsWire INE Security, a global provider of cybersecurity training and…

9 hours ago

Hackers Using Fake Semrush Ads to Steal Google Accounts Login Credentials

A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing…

11 hours ago

Pocket Card Users Under Attack Via Sophisticated Phishing Campaign

A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails…

12 hours ago

Operation Red Card – 300+ Cyber Criminals Arrested Linking to Multiple Hacking Activities

INTERPOL led a multi-national law enforcement operation dubbed "Operation Red Card," which has resulted in…

12 hours ago

Hackers Could Drop Teams Malware via Browser’s Cache Smuggling

A novel attack vector combining browser cache exploitation and DLL proxying has emerged as a…

12 hours ago

New Linux Kernel Rust Module Unveiled to Detect Rootkits

A groundbreaking security tool has emerged in the ongoing battle against sophisticated Linux malware. A…

12 hours ago