Cyber Security News

Hackers Using Fake Semrush Ads to Steal Google Accounts Login Credentials

A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing a significant threat to digital marketers and SEO professionals.

Cybercriminals have deployed numerous malicious advertisements that appear legitimate in Google search results, leveraging Semrush’s growing popularity in the SEO industry to lure unsuspecting victims.

Malicious Ads (Source – Malwarebytes)

These fraudulent ads redirect users to convincing replicas of the Semrush login page, where they are prompted to authenticate with their Google accounts.

The attack represents a concerning evolution in phishing tactics, as it specifically targets professionals who use SEO and marketing platforms, potentially giving attackers access to valuable business analytics and competitive intelligence.

When victims click on these deceptive ads, they are redirected through a chain of domains before landing on the phishing page that closely mimics Semrush’s authentic login interface.

Fake login page (Source – Malwarebytes)

The attackers have meticulously designed these pages to appear legitimate, including properly formatted logos, layout, and messaging that creates a false sense of security.

Malwarebytes researchers identified that this campaign appears to be operated by the same threat actors who previously targeted Google Ads accounts using Google Sites earlier this year.

“We believe the criminals behind it likely regrouped and switched to a less direct approach, yet one that might deliver just as much,” noted security researcher Jérôme Segura in his analysis of the infrastructure.

Fake Google account authentication page (Source – Malwarebytes)

The researchers discovered that while the phishing page displays both standard login options and “Log in with Google” buttons, only the Google authentication option is actually enabled.

The attackers have established an extensive network of malicious domains, all variations on the Semrush name, including semrush.tech, semrush-pro.click, ads-semrush.com, and semrush.works.

Each ad uses a unique domain that redirects to more static domains dedicated to the fake login pages, making detection and takedown more challenging.

Technical Infrastructure

Examining the attack chain reveals a sophisticated multi-stage redirection process.

When a victim clicks on one of these malicious ads, they are first sent to a primary domain (e.g., semrush.works/?gad_source=1&gclid=…) which returns a 200 status code before redirecting to a secondary phishing domain (e.g., sem-rushhh.com).

Redirecting to a secondary phishing domain (Source – Malwarebytes)

This secondary domain hosts the convincing Semrush-branded landing page that prominently features the Google authentication option.

The phishing form captures credentials and transmits them to the attackers’ servers, while presenting users with convincing error messages or redirects to maintain the illusion of legitimacy.

This carefully constructed deception chain demonstrates the increasing sophistication of modern phishing operations targeting business-critical platforms and credentials.

Enhance Your Security Solutions with First Watch Malicious Domains Data Feed -> Download Free Product Sample(PDF)

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Konni APT Hackers Using Multi-Stage Malware to Attack Organizations

A sophisticated multi-stage malware campaign linked to the North Korean Konni APT group has been…

15 minutes ago

Outlaw Cybergang Attacking Linux Environments Worldwide With New Malware

A previously documented threat actor known as Outlaw (or “Dota”) has resurfaced with an enhanced…

27 minutes ago

Securing Boardroom Buy-In for Your Cybersecurity Budget

Cybersecurity has evolved from a technical concern to a strategic business priority. With escalating regulatory…

41 minutes ago

Hackers Exploit MS Equation Editor Vulnerability to Deploy XLoader Malware

A sophisticated phishing campaign exploiting a nearly 8-year-old Microsoft Office vulnerability to distribute the dangerous…

51 minutes ago

Aligning Cybersecurity with ESG – CISO’s Strategic Guide

In an era where sustainability and ethical governance dominate corporate agendas, cybersecurity has emerged as…

1 hour ago

Key Breakthroughs from RSA Conference 2025 – Day 1

The first day of the RSA Conference 2025 set the stage for a transformative era…

2 hours ago