{"id":34554,"date":"2025-05-20T21:38:56","date_gmt":"2025-05-20T19:38:56","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/semrush-phishing-websites-in-google-ads\/34554\/"},"modified":"2025-05-20T21:38:56","modified_gmt":"2025-05-20T19:38:56","slug":"semrush-phishing-websites-in-google-ads","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/semrush-phishing-websites-in-google-ads\/34554\/","title":{"rendered":"Fake websites popping up in Google search ads"},"content":{"rendered":"<p>Many company employees use various online services through their web browsers every day. Some of them remember website addresses they use frequently and type them in directly, while others \u2013 probably most \u2013 save bookmarks. Then there are folks who type the service name into a search engine every time and just click the first link that comes up. These are apparently the kind of users that cybercriminals target when they promote their fake (phishing) sites through Google Ads. This promotion makes the fake pages show up higher in search results than the respective authentic websites.<\/p>\n<p>According to Google\u2019s <a href=\"https:\/\/services.google.com\/fh\/files\/misc\/ads_safety_report_2024.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Ads Safety Report<\/a>, 2024, Google blocked or removed a whopping 415 million ads last year for breaking their rules \u2013 mostly \u00a0by running scams. The company also blocked five million advertising accounts that were placing these kinds of ads. This gives you an idea of the sheer scale of the problem. Google Ads is an incredibly popular tool for cybercriminals to spread their malicious content. Although a significant proportion of these schemes target regular home users, there\u2019ve been stories lately about scammers going after Semrush or even Google Ads business accounts.<\/p>\n<h2>Fake Semrush pages<\/h2>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Semrush\" target=\"_blank\" rel=\"nofollow noopener\">Semrush<\/a> is a popular tool that helps you find keywords, analyze your competitors\u2019 websites, track backlinks, and so on. It\u2019s used by SEO pros all over the world. For better performance, Semrush is often integrated with Google Analytics and Google Search Console. Accounts in those services can hold a ton of private business information \u2013 such as revenue reports, marketing strategies, analysis of customer behavior, and a lot more.<\/p>\n<p>If cybercriminals can gain access to a Semrush account, they can use that information they find there to launch more attacks on other employees, or just sell the access on the dark web.<\/p>\n<p>It\u2019s small wonder that some crooks have launched a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-semrush-ads-used-to-steal-seo-professionals-google-accounts\/\" target=\"_blank\" rel=\"nofollow noopener\">phishing campaign<\/a> that targets SEO professionals. They set up a series of websites whose design closely mimics the Semrush sign-in page. To appear legitimate, the scammers employed multiple domain names that included the name of the company they were imitating: <em>semrush[.]click<\/em>, <em>semrush[.]tech<\/em>, <em>auth.seem-rush[.]com<\/em>, <em>semrush-pro[.]co<\/em>, <em>sem-rushh[.]com<\/em>, and so on. And they use Google Ads to promote all these fake sites.<\/p>\n<p>The only way to tell the fake pages from the real one is by checking the website address. Just like the real Semrush sign-in page, the fake pages show two main ways to authenticate: using a Google account, or by typing in your Semrush username and password. But the criminals have cleverly blocked the fields where you would type in your Semrush credentials; therefore, the victims don\u2019t have any other choice but to try signing in with Google.<\/p>\n<p>Another fake page then opens that does a no-less-convincing job imitating the Google account sign-in page. Of course, any Google account credentials entered there go straight to the scammers.<\/p>\n<h2>Fake Google Ads in Google Ads<\/h2>\n<p>An even more intriguing twist on the same type of attack saw the cybercriminals leveraging <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-use-google-search-ads-to-steal-google-ads-accounts\/\" target=\"_blank\" rel=\"nofollow noopener\">Google Ads to promote fake versions of\u2026 Google Ads<\/a>! The way it works is quite similar to how they go after Semrush credentials \u2013 but with one really interesting nuance: the website address shown in the fake Google Ads ad is <em>exactly<\/em> the same as the real one <em>(ads.google[.]com<\/em>)!<\/p>\n<p>The scammers have been able to pull this off by using another Google service: Google Sites, a website-building platform. According to the Google Ads rules, an ad can show the address of any page as long as its domain matches the domain of the actual website the ad redirects to. So, if the attacker creates an intermediate website with Google Sites, it has a <em>google.com<\/em> domain name, which means they\u2019re allowed to display the <em>ads.google.com<\/em> address in their ad.<\/p>\n<p>Links from this temporary site then redirect to a page that looks just like the Google Ads sign-in. If the user fails to notice they\u2019ve left the real Google pages and types in their login information, it lands right in the hands of the cybercriminals.<\/p>\n<h2>How to keep your company safe from phishing<\/h2>\n<p>The only way to comprehensively solve the problem of malicious websites being promoted through Google Ads is for Google itself to step up. To their credit, in both the cases described above (the fake Google Ads pages and Semrush sites), the company did take action quickly by removing them from the top of the search results.<\/p>\n<p>To keep your organization safe from these kinds of phishing attacks, we recommend doing the following:<\/p>\n<ul>\n<li>Remind your employees that it\u2019s best to bookmark websites they visit often instead of relying on search engines every time.<\/li>\n<li>Train your employees to spot potential threats. This is something you can easily and cost-effectively automate with an e-learning platform like the <a href=\"https:\/\/k-asap.com\/en\/?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>.<\/li>\n<li>Make sure to use multi-factor authentication for all services that support it. For Google accounts, it\u2019s best to use a <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-set-up-passkeys-in-google-account\/49515\/\" target=\"_blank\" rel=\"noopener nofollow\">passkey<\/a>.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.co.za\/next?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____cecf5bf7a71acade\" target=\"_blank\" rel=\"noopener\">robust security solution <\/a> on all company devices. It\u2019ll warn you about dangers and stop you from visiting suspicious websites.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>Scammers are using Google ads to push fake versions of real websites \u2013 and they&#8217;re after business accounts and company data.<\/p>\n","protected":false},"author":2726,"featured_media":34555,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3020,3021],"tags":[2141,22,3787,76,1146,422],"class_list":{"0":"post-34554","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-business","11":"tag-google","12":"tag-google-ads","13":"tag-phishing","14":"tag-risks","15":"tag-threats"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/semrush-phishing-websites-in-google-ads\/34554\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/semrush-phishing-websites-in-google-ads\/28882\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/semrush-phishing-websites-in-google-ads\/24106\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/semrush-phishing-websites-in-google-ads\/28984\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/semrush-phishing-websites-in-google-ads\/39541\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/semrush-phishing-websites-in-google-ads\/53460\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/semrush-phishing-websites-in-google-ads\/29144\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/semrush-phishing-websites-in-google-ads\/34923\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/34554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=34554"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/34554\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/34555"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=34554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=34554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=34554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}