Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware

Posted on January 19, 2026January 19, 2026 By CWS

A brand new spear-phishing marketing campaign referred to as Operation Poseidon has emerged, exploiting Google’s promoting infrastructure to distribute EndRAT malware whereas evading conventional safety measures.

he assault leverages professional advert click on monitoring domains to disguise malicious URLs, making them seem as reliable promoting site visitors. This system successfully bypasses e mail safety filters and reduces person suspicion throughout the preliminary an infection stage.

The risk actors behind this marketing campaign belong to the Konni APT group, which has been concentrating on South Korean organizations by refined social engineering ways.

The attackers impersonate North Korean human rights organizations and monetary establishments to lure victims into downloading malicious information.

These information are usually disguised as monetary paperwork, transaction confirmations, or official notices that mix seamlessly into regular enterprise communications.

Operation Poseidon Timeline (Supply – Genians)

Genians analysts recognized the marketing campaign by detailed forensic evaluation of malicious scripts containing inner artifacts.

The researchers found that the attackers use compromised WordPress web sites as malware distribution factors and command-and-control infrastructure.

This method permits fast turnover of assault infrastructure, undermining the effectiveness of conventional URL and area blocking insurance policies.

The malware execution chain begins when victims click on on disguised promoting URLs embedded in spear-phishing emails, which redirect them by Google’s advert.doubleclick.web area to compromised servers internet hosting malicious ZIP archives.

Malicious URL Embedded in a Reliable Promoting URL Parameter (Supply – Genians)

Inside these archives are LNK shortcut information that set off the obtain and execution of AutoIt scripts masquerading as PDF paperwork. These scripts load EndRAT-variant distant entry trojans straight into reminiscence with out requiring additional person interplay.

The malware consists of distinctive identifier strings comparable to “endServer9688” and “endClient9688” for command-and-control communications.

Inner construct paths revealed the operation’s codename “Poseidon,” suggesting organized administration as a definite operational unit throughout the Konni APT framework.

Assault Execution and Evasion Methods

The assault employs a number of layers of detection evasion ranging from the e-mail supply stage. Phishing emails include giant volumes of meaningless English textual content inserted into invisible HTML areas utilizing the show:none attribute.

This content material padding method confuses AI-based phishing detection programs and spam filters by artificially lengthening e mail content material and disrupting key phrase evaluation logic.

Compiler Directives of the AutoIt Script (Supply – Genians)

The emails additionally embody clear 1×1 pixel internet beacons that ship HTTP requests to attacker-controlled servers when opened, permitting risk actors to trace recipient engagement and ensure energetic e mail addresses.

The malware supply URLs exploit the construction of professional promoting platforms by embedding command-and-control addresses inside URL parameters.

Risk Infrastructure Correlation Diagram (Supply – Genians)

This makes the redirection seem as regular promoting site visitors, considerably decreasing detection chance.

The LNK information themselves masks file extensions and icons to look as professional paperwork, finishing a complicated assault chain designed to evade each signature-based and behavior-based safety frameworks.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Abusing, Ads, Attack, Deliver, EndRAT, Google, Malware, SpearPhishing

Post navigation

Previous Post: TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking
Next Post: Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites

Related Posts

10 Best Enterprise Remote Access Software Cyber Security News
Massive Hacking Operation WrtHug Compromises Thousands of ASUS Routers Worldwide Cyber Security News
Top 10 Best Dynamic Malware Analysis Tools in 2026 Cyber Security News
Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency Cyber Security News
100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild Cyber Security News
US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware
  • Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins
  • Attackers Redirected Employee Paychecks Without Breaching a Single System
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware
  • Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins
  • Attackers Redirected Employee Paychecks Without Breaching a Single System
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark