Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Google Ads to Target ManageWP Users

Hackers Exploit Google Ads to Target ManageWP Users

Posted on May 7, 2026 By CWS

Cybercriminals are reportedly leveraging fraudulent Google advertisements to capture login details from users of ManageWP, a renowned platform by GoDaddy for managing WordPress sites. This deceptive campaign, identified as ‘WrongPress’ by researchers, strategically places fake ads above genuine ManageWP listings, ensnaring users before they spot the deceit.

Major Risks for Web Administrators

ManageWP serves a critical role for web developers, digital agencies, and large enterprises tasked with overseeing numerous websites. With over one million installations of the ManageWP Worker plugin, according to WordPress.org, a single compromised account offers attackers unprecedented access to a vast network of sites.

The attack is triggered when a user searches for ‘managewp’ on Google, displaying a counterfeit ad above the legitimate link. Guardio Labs, the cybersecurity firm that uncovered this scheme, cautions that even vigilant users might be deceived due to the ad’s convincing placement.

The Deceptive Mechanics of the Attack

A distinguishing feature of this threat is the meticulous replication of the real ManageWP login interface, leaving unsuspecting users vulnerable to credential theft. Once a user inputs their login information, the details are covertly transmitted to an attacker-controlled channel.

Guardio Labs has already identified at least 200 victims and is actively working to notify those affected. By penetrating the attacker’s infrastructure, researchers have gained insights into the campaign’s scope and methods.

Protective Measures for Website Owners

The attack chain is designed to bypass both Google’s ad review systems and user suspicion. It uses a cloaker to filter out automated inspections, allowing only genuine users to encounter the malicious page. This strategy enables attackers to evade detection and manipulate Google Ads to their advantage.

Once on the fake page, a live intermediary attack, known as adversary-in-the-middle (AiTM), captures the victim’s credentials and forwards them to the real ManageWP site. Even two-factor authentication is rendered ineffective, as attackers can utilize the code in real time.

Experts recommend avoiding ads when accessing login pages and suggest bookmarking official URLs or entering them directly. Employing advanced security measures like hardware keys can further safeguard against such phishing attempts.

The ‘WrongPress’ campaign underscores the growing sophistication of online threats. Ensuring the authenticity of links before clicking is crucial as cybercriminals continue to exploit search advertising for malicious ends.

Cyber Security News Tags:ad fraud, AiTM attack, cyber attack, Cybersecurity, GoDaddy, Google Ads, Guardio Labs, hacking campaign, login credentials, ManageWP, online safety, Phishing, security breach, website management, WordPress

Post navigation

Previous Post: Daemon Tools Supply Chain Breach Managed, Says Vendor
Next Post: Cisco Resolves Critical Flaws in Enterprise Solutions

Related Posts

Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data Cyber Security News
WhatsApp Crypt Tool to Encrypt and Decrypt WhatsApp Backups WhatsApp Crypt Tool to Encrypt and Decrypt WhatsApp Backups Cyber Security News
Hackers Registered 18,000 Holiday-Themed Domains Targeting ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale’ Hackers Registered 18,000 Holiday-Themed Domains Targeting ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale’ Cyber Security News
New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis Cyber Security News
New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs Cyber Security News
Stolen API Key Causes ,000 Cloud Charges in Two Days Stolen API Key Causes $82,000 Cloud Charges in Two Days Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cisco Resolves Critical Flaws in Enterprise Solutions
  • Hackers Exploit Google Ads to Target ManageWP Users
  • Daemon Tools Supply Chain Breach Managed, Says Vendor
  • PCPJack Compromises Cloud Systems Using 5 CVEs
  • Palo Alto Networks Faces Ongoing Zero-Day Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cisco Resolves Critical Flaws in Enterprise Solutions
  • Hackers Exploit Google Ads to Target ManageWP Users
  • Daemon Tools Supply Chain Breach Managed, Says Vendor
  • PCPJack Compromises Cloud Systems Using 5 CVEs
  • Palo Alto Networks Faces Ongoing Zero-Day Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark