Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Crypto Users Targeted by Fake Google Ads and Wallet Drainers

Crypto Users Targeted by Fake Google Ads and Wallet Drainers

Posted on April 22, 2026 By CWS

Cybercriminals have started exploiting Google’s advertising platform to deceive cryptocurrency holders, with the aim of stealing their assets. These attackers create misleading advertisements that mimic legitimate crypto application links. When users click on these ads, they are redirected to malicious sites designed to either drain their wallets or trick them into revealing their recovery phrases.

Rise in Malicious Ad Campaigns

The strategy of using fake ads is not novel, but it has significantly escalated in 2026. March saw a peak in such activities, with threat actors consistently deploying fraudulent ads weekly for over a year. These campaigns have specifically targeted popular platforms like Uniswap, PancakeSwap, Morpho Finance, Hyperliquid, CoW Swap, and the hardware wallet brand Ledger.

The scale and persistence of these operations suggest a highly organized group behind them, showing no signs of abating. Analysts at SecurityAlliance (SEAL) have been tracking multiple threat actors associated with these campaigns.

Methods of Attack

Researchers have identified three primary types of malicious payloads used by attackers: wallet drainers, seed phrase stealers, and fake browser extensions. Wallet drainers utilize in-browser JavaScript to get victims to authorize harmful transactions, while seed phrase stealers present a counterfeit website prompting users to input their recovery phrases. Additionally, fake browser extensions are distributed via links from the Chrome Web Store.

Within weeks, SEAL managed to block over 356 malicious advertisement URLs, although this figure likely represents just a fraction of the total. The financial impact is substantial, with at least $1,274,259 stolen between March 13 and March 30, 2026, and $810,929 directly attributable to known attacks. A single incident in early March accounted for $385,000 in losses.

Brand Impersonation and Defense Strategies

Uniswap was the most impersonated brand, accounting for 41% of detected malicious sites, followed by Morpho Finance at 31%. The attack’s infrastructure involves a complex delivery mechanism that obscures the threat from Google’s detection systems. Ads initially link to seemingly safe Google-owned domains, allowing them to pass initial reviews.

Malicious content is loaded separately via hidden iframes, using fingerprinting and cloaking scripts to differentiate between researchers and real users. Non-targeted visitors are redirected to benign pages, while real users encounter cloned application interfaces. A man-in-the-middle proxy layer intercepts and reroutes network traffic, giving attackers access to wallet balances and transaction activities.

SEAL advises cryptocurrency users to avoid using Google Search for accessing crypto applications. Instead, users should bookmark trusted URLs and use them directly. Cryptocurrency-specific indexing tools like search.defillama.com can verify the authenticity of sites before connecting a wallet. Organizations should enforce strict policies on direct URL access and remain wary of search results, including sponsored links.

Google has suspended all advertiser accounts implicated in this report, but perpetrators continue to create new accounts rapidly. Users are urged to stay vigilant and rely solely on bookmarked links for the best protection.

Cyber Security News Tags:crypto security, crypto users, Cryptocurrency, Cybersecurity, digital assets, Google, Google Ads, malicious ads, Morpho Finance, online safety, phishing attacks, SecurityAlliance, seed phrase theft, Uniswap, wallet drainers

Post navigation

Previous Post: French Fintech Accounts Abused by Cybercriminals for Money Laundering
Next Post: Malware Campaign Utilizes Fake GitHub Repositories

Related Posts

Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors Cyber Security News
Formbook Malware Delivered Using Weaponized Zip Files and Multiple Scripts Formbook Malware Delivered Using Weaponized Zip Files and Multiple Scripts Cyber Security News
New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach Cyber Security News
Scaling SOC Team Expertise With AI-powered Insights for Faster, Easier Understanding of Threats Scaling SOC Team Expertise With AI-powered Insights for Faster, Easier Understanding of Threats Cyber Security News
New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials Cyber Security News
Phishing Alert: Fake Party Invites Install Remote Access Software Phishing Alert: Fake Party Invites Install Remote Access Software Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Unveils Threat from North Korean IT Imposters
  • Lotus Wiper Malware Targets Energy Sector with Destructive Attack
  • Malware Campaign Utilizes Fake GitHub Repositories
  • Crypto Users Targeted by Fake Google Ads and Wallet Drainers
  • French Fintech Accounts Abused by Cybercriminals for Money Laundering

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Unveils Threat from North Korean IT Imposters
  • Lotus Wiper Malware Targets Energy Sector with Destructive Attack
  • Malware Campaign Utilizes Fake GitHub Repositories
  • Crypto Users Targeted by Fake Google Ads and Wallet Drainers
  • French Fintech Accounts Abused by Cybercriminals for Money Laundering

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark