![]() The research revealed that OBS is one of several software that threat actors pretend to be in order to promote malicious downloads in Google Ads search results.Ī Google Ad search result for Rufus, a free tool for making bootable USB flash drives, is one example BleepingComputer’s team identified. Malicious Ads In Google īleepingComputer conducted an investigation to find out if the case was isolated or not. Their Gmail, Substack, Discord, and cryptocurrency wallets also fell under the hackers’ control. Later, the influencer would find that their OpenSea account has also been compromised by the info-stealing malware, and a different wallet was listed as the owner of one of their digital assets. NFT God had no idea that this was probably data-stealing software that had taken their saved browser passwords, cookies, Discord tokens, and cryptocurrency wallets and delivered them to a distant attacker. However, friends informed them that their Twitter account had been hijacked a few hours later. Sharing the experience on Twitter, the influencer said that “nothing happened” when they accessed the EXE. What I didn’t realize was I clicked the sponsored link on google I was excited to live stream some video games for the first time in my life. OBS is industry standard video streaming software. Yesterday afternoon I went to download OBS onto my personal desktop computer. The crypto influencer known as NFT God fell victim to the hackers’ efforts after launching a fake executable for the Open Broadcaster Software (OBS) video recording and live streaming software they downloaded from a Google ad in search results. ![]() Crypto Influencer Stripped of NFTsĪt least one well-known cryptocurrency user claims to have been a victim of the operation, which allowed hackers to take control of both their personal and professional accounts as well as all of their digital crypto assets. Security researchers discovered that lately a lot of fake websites impersonating popular free and open-source software have started to pop up in the sponsored section on Google search results. As time passes, threat actors are getting sneakier in their efforts. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |