{"id":25223,"date":"2023-12-23T07:38:31","date_gmt":"2023-12-23T07:38:31","guid":{"rendered":"https:\/\/crowdfundjunction.com\/blog\/google-ads-exploited-in-59-million-crypto-theft\/"},"modified":"2023-12-23T07:38:31","modified_gmt":"2023-12-23T07:38:31","slug":"google-ads-exploited-in-59-million-crypto-theft","status":"publish","type":"post","link":"https:\/\/crowdfundjunction.com\/blog\/google-ads-exploited-in-59-million-crypto-theft\/","title":{"rendered":"Google Ads Exploited in $59 Million Crypto Theft"},"content":{"rendered":"<p><b>(Originally posted on : Crypto News &#8211; iGaming.org )<\/b><br \/>\n<\/p>\n<div>\n<p>Scammers have exploited a new method to siphon off cryptocurrency, leveraging a wallet-draining service named \u201cMS Drainer.\u201d In a report dated December 21, Scam Sniffer, a blockchain security firm, revealed that over the past nine months, approximately $59 million in crypto was stolen using this service. The report, published on X (formerly Twitter), highlighted how scammers used Google Ads to deceive victims with counterfeit versions of popular crypto sites like DefiLlama, Lido, Orbiter Finance, Stargate, Radiant, and Zapper.<\/p>\n<p>MS Drainer operates as a blockchain protocol that enables scammers to illicitly transfer cryptocurrency from victims\u2019 wallets by manipulating the token approval process. The creators of this software typically require a share of the stolen funds, enforcing this payment through smart contracts that are notoriously difficult to circumvent.<\/p>\n<p>Scam Sniffer first encountered MS Drainer in March, with the assistance of the SlowMist security platform team in their investigation. Further insights were provided in June by on-chain investigator ZachXBT, who linked MS Drainer to a phishing scam known as \u201cOrdinal Bubbles.\u201d ZachXBT discovered nine phishing ads on Google, with 60% of these employing the MS Drainer software.<\/p>\n<p>Google has systems in place to audit and prevent phishing scam ads. However, the Scam Sniffer report indicated that the scammers employed regional targeting and page-switching techniques to evade these audits, complicating Google\u2019s review process. This strategy allowed the deceptive ads to slip past Google\u2019s defenses. The scammers also used web redirects, misleading users into believing they were accessing legitimate websites.<\/p>\n<div class=\"main-org-3-item-ins box-100 relative mb-4\">\n<div class=\"space-org-3-items box-100 relative\">\n<div class=\"box-100 space-org-3-item relative border-tb mt-1 \">\n<div class=\"space-org-3-item-ins box-100 relative\">\n<div class=\"space-org-3-item-terms box-25 relative\">\n<div class=\"space-org-3-item-terms-ins box-100 text-center relative\"> <strong><strong>Get 125% \/ $2,500 on 1st deposit!<\/strong><\/strong> <\/p>\n<p>New players only. Exclusive Welcome Bonus of up to $2,500<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>Scam Sniffer\u2019s findings include the identification of 10,072 fraudulent websites using MS Drainer. According to a Dune Analytics tracking dashboard, this scheme has resulted in the theft of $58.98 million in cryptocurrency from over 63,000 victims.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/igaming.org\/crypto\/google-ads-exploited-in-59-million-crypto-theft\/\">Source link <\/a><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>(Originally posted on : Crypto News &#8211; iGaming.org ) Scammers have exploited a new method to siphon off cryptocurrency, leveraging a wallet-draining service named \u201cMS Drainer.\u201d In a report dated December 21, Scam Sniffer, a blockchain security firm, revealed that over the past nine months, approximately $59 million in crypto was stolen using this service. [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":25224,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[34],"tags":[],"_links":{"self":[{"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/posts\/25223"}],"collection":[{"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/comments?post=25223"}],"version-history":[{"count":0,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/posts\/25223\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/media\/25224"}],"wp:attachment":[{"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/media?parent=25223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/categories?post=25223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crowdfundjunction.com\/blog\/wp-json\/wp\/v2\/tags?post=25223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}