Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware

Posted on January 19, 2026January 19, 2026 By CWS

A brand new spear-phishing marketing campaign referred to as Operation Poseidon has emerged, exploiting Google’s promoting infrastructure to distribute EndRAT malware whereas evading conventional safety measures.

he assault leverages professional advert click on monitoring domains to disguise malicious URLs, making them seem as reliable promoting site visitors. This system successfully bypasses e mail safety filters and reduces person suspicion throughout the preliminary an infection stage.

The risk actors behind this marketing campaign belong to the Konni APT group, which has been concentrating on South Korean organizations by refined social engineering ways.

The attackers impersonate North Korean human rights organizations and monetary establishments to lure victims into downloading malicious information.

These information are usually disguised as monetary paperwork, transaction confirmations, or official notices that mix seamlessly into regular enterprise communications.

Operation Poseidon Timeline (Supply – Genians)

Genians analysts recognized the marketing campaign by detailed forensic evaluation of malicious scripts containing inner artifacts.

The researchers found that the attackers use compromised WordPress web sites as malware distribution factors and command-and-control infrastructure.

This method permits fast turnover of assault infrastructure, undermining the effectiveness of conventional URL and area blocking insurance policies.

The malware execution chain begins when victims click on on disguised promoting URLs embedded in spear-phishing emails, which redirect them by Google’s advert.doubleclick.web area to compromised servers internet hosting malicious ZIP archives.

Malicious URL Embedded in a Reliable Promoting URL Parameter (Supply – Genians)

Inside these archives are LNK shortcut information that set off the obtain and execution of AutoIt scripts masquerading as PDF paperwork. These scripts load EndRAT-variant distant entry trojans straight into reminiscence with out requiring additional person interplay.

The malware consists of distinctive identifier strings comparable to “endServer9688” and “endClient9688” for command-and-control communications.

Inner construct paths revealed the operation’s codename “Poseidon,” suggesting organized administration as a definite operational unit throughout the Konni APT framework.

Assault Execution and Evasion Methods

The assault employs a number of layers of detection evasion ranging from the e-mail supply stage. Phishing emails include giant volumes of meaningless English textual content inserted into invisible HTML areas utilizing the show:none attribute.

This content material padding method confuses AI-based phishing detection programs and spam filters by artificially lengthening e mail content material and disrupting key phrase evaluation logic.

Compiler Directives of the AutoIt Script (Supply – Genians)

The emails additionally embody clear 1×1 pixel internet beacons that ship HTTP requests to attacker-controlled servers when opened, permitting risk actors to trace recipient engagement and ensure energetic e mail addresses.

The malware supply URLs exploit the construction of professional promoting platforms by embedding command-and-control addresses inside URL parameters.

Risk Infrastructure Correlation Diagram (Supply – Genians)

This makes the redirection seem as regular promoting site visitors, considerably decreasing detection chance.

The LNK information themselves masks file extensions and icons to look as professional paperwork, finishing a complicated assault chain designed to evade each signature-based and behavior-based safety frameworks.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Abusing, Ads, Attack, Deliver, EndRAT, Google, Malware, SpearPhishing

Post navigation

Previous Post: TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking
Next Post: Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites

Related Posts

Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace Cyber Security News
Multiple Kibana Vulnerabilities Enables SSRF and XSS Attacks Cyber Security News
Incident Response Team ShieldForce Partners with AccuKnox to Deliver Zero Trust CNAPP in Latin America Cyber Security News
Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News
New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Redirected Employee Paychecks Without Breaching a Single System
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware
  • TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking
  • Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Redirected Employee Paychecks Without Breaching a Single System
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware
  • TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking
  • Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark