Article Details
Scrape Timestamp (UTC): 2023-12-17 23:49:51.008
Original Article Text
Click to Toggle View
WordPress hosting service Kinsta targeted by Google phishing ads. WordPress hosting provider Kinsta is warning customers that Google ads have been observed promoting phishing sites to steal hosting credentials. Kinsta says the phishing attacks aim to steal login credentials for MyKinsta, a key service the company offers to manage WordPress and other cloud-based apps. In an email sent to its customers, Kinsta said it has identified that the attackers are leveraging Google Ads, targeting individuals who have previously visited Kinsta's official websites. The threat actors create sponsored websites that closely mimic Kinsta's, tricking users into clicking on them. "We are writing to alert you to a phishing scam where attackers use fraudulent sites to gather MyKinsta login credentials," Kinsta noted in an email seen by BleepingComputer. "The attackers are using Google Ads to target people who have visited kinsta.com or my.kinsta.com. The sponsored websites are dangerous, and you should not click on any links with URLs other than kinsta.com or access fraudulent sites in any way." Kinsta emphasizes these sites are malicious, and users should be vigilant not to visit links that do not directly lead to the official kinsta.com or my.kinsta.com websites. The company also recommends users enable two-factor authentication on their accounts to prevent access to the account even if credentials are stolen. Further, the company cautioned that these attackers might also send phishing emails or other forms of communication, convincing users to log into the MyKinsta phishing sites through these malicious links to steal login credentials. In response to these threats, Kinsta is actively identifying and taking down the phishing sites but warns users to take proactive steps to safeguard their accounts. Kinsta recommended accessing MyKinsta directly by typing my.kinsta.com in the browser and disregarding any text messages claiming to be from Kinsta. Google ads increasingly used by hackers It is important to note that this is not an isolated incident with Google ads, where there has been a notable increase in similar incidents, including a deceptive ad for Amazon. As BleepinpComputer spotted in August, bad actors had published an ad in Google search results that appeared to be for Amazon. However, when users click on this ad, they are redirected to a tech support scam masquerading as a tech support page from Microsoft Defender. Other Google ads promoted websites that pretended to be download sites for legitimate software, including Grammarly, MSI Afterburner, Slack, Dashlane, Malwarebytes, Audacity, μTorrent, OBS, Ring, AnyDesk, Libre Office, Teamviewer, Thunderbird, and Brave. However, these fake installers would install malware, such as Raccoon Stealer, a custom version of the Vidar Stealer, and the IcedID malware loader.
Daily Brief Summary
Kinsta, a WordPress hosting provider, is alerting customers about phishing sites impersonating their service, which are promoted through Google ads.
The phishing campaign is targeting users with the intent to steal login credentials for the MyKinsta management service.
Customers are being directed to sponsored fraudulent websites that mimic Kinsta's official site, with the aim of collecting MyKinsta login details.
Kinsta advises users to enable two-factor authentication as an additional security measure and to only access MyKinsta by typing the URL directly into their browsers.
The company warns users against clicking on any links other than those from official Kinsta domains and advises disregarding any text messages purporting to be from Kinsta.
This incident is part of a larger trend, with a notable increase in cybercriminals exploiting Google ads to promote phishing endeavors and distribute malware.
In similar cases, attackers have used Google ads to lure users to fake tech support pages or to malicious software downloads posing as reputable applications.