Hackers are increasingly using online ads for malicious purposes. Often, it’s happening through routine Google searches.
These schemes are dubbed malvertising, and cyber criminals are striking more often and with increased sophistication. In fall 2023, cybersecurity software firm Malwarebytes tracked a 42% increase month-over-month in malvertising incidents in the U.S. All types of brands are being targeted, whether it’s for phishing purposes or for actual malware, said Jérôme Segura, senior director of research at Malwarebytes. “What I’m seeing is just the tip of the iceberg,” he said.
Many of these rogue ads appear as sponsored content during a search engine query on a desktop or mobile device. But malicious code can also be hidden in ads that appear on mainstream websites consumers routinely visit. Some of these ads will only ensnare consumers who click on them, but in some cases, people can be vulnerable in a more passive way — sometimes just by visiting an infected site, said Erich Kron, security awareness advocate for KnowBe4, a security awareness and training company.
Corporate employees can also be targets of malvertising, Segura said. He cited a few actual examples that were recently uncovered involving big companies. Lowe’s staff members were targeted via a Google ad for an employee portal claiming to be associated with the retailer. Clicking on the link, “myloveslife.net,” which contains a misspelling of the company’s name, took users to a phishing page with Lowe’s logo. This had the potential to confuse employees since many don’t know offhand the URL for their internal website. “You see the brand, even the official logo of that brand, and for you it’s enough to think it’s real,” Segura said.
Segura also cited an ad meant to impersonate Salesforce-owned communication tool Slack. Initially, by clicking on the ad, he was redirected to a price page on Slack’s official website. But suspecting bad actors were at play, Segura dug deeper and uncovered an impersonation ploy, which involved trying to convince unsuspecting users to download something purporting to be the Slack app.
It’s not Google’s fault, but don’t trust it
Malvertising is not new, but cybercriminals are getting smarter and the ads are often so realistic that it’s easy to be duped. The problem is exacerbated by the fact that so many people use and trust Google as a search engine, where many of the malicious ads can be found. It’s not a problem with Google, per se; malicious ads can also show up in queries using other search engines like Microsoft’s Bing. It’s just that Google is such a widely used search engine and people trust it and let their guard down. “You see something appearing on a Google search, you kind of assume it is something valid,” said Stuart Madnick, professor of information technology at MIT Sloan School of Management.
Consumers can also fall prey to malicious ads on trusted websites they visit regularly. Many of these ads are legitimate, but some bad ones can slip through the cracks. “It’s like the post office. Does the mailman check every letter you get to make sure it’s really from Publishers Clearing House?” Madnick said.
Be very careful about where and when you click
Consumers can take steps to protect themselves against malvertising attempts. For instance, they should avoid clicking on sponsored links that come up during an internet search. Often, the first ad below the sponsored one will be the product they are looking for, and since it isn’t sponsored, there’s less chance of being sidelined by malicious code or a phishing attempt.
If you do click on a sponsored link, check the URL at the top of the web page to make sure it’s really where you meant to be before taking any other actions. For example, if you’re trying to visit Gap.com, make sure you’re not really on Gaps.com. Consumers who find themselves on a suspicious site should close the window immediately, said Avinash Collis, assistant professor at Carnegie Mellon University’s Heinz College. In most cases, this will avoid further trouble, he said.
Consumers also need to be careful about clicking ads they see on trusted websites, Kron said. They may, for instance, see ads for products that are much lower in cost than elsewhere. But Kron recommends not clicking and instead visiting the trusted website of the product seller. Most of the time, consumers will be able to search on the provider’s site if a special deal exists, or the deal will be highlighted on the main page of the trusted website, he said.
Also avoid calling a telephone number listed in a sponsored ad because it could be a fake telephone number. If you call it, cyber thieves could gain access to your computer or your personal information, depending on the scheme, said Chris Pierson, CEO of BlackCloak, a cybersecurity and privacy platform that provides digital executive protection for corporate executives.
Consumers should make sure they are calling a number from official product documentation they have in their possession, Pierson said. Alternatively, consumers could visit the company’s home page for this information. “Doing a [web] search could return results that are not sponsored by the company and telephone numbers that are associated with cybercriminals. All it takes to get an ad out there is money and, of course, cybercriminals that are stealing money, have the ability to pay for that bait,” Pierson said.
Avoid ‘drive-by-downloads’
Consumers should also make sure the operating system and internet browsers are up-to-date on their computer and mobile phone.
So-called drive-by-downloads, which can impact people who merely visit a website infected with malicious codes, generally rely on a vulnerability in the user’s browser. This is not as much of a threat for people who keep their browsers and browser extensions up-to-date, Kron said.
Consumers could also consider installing anti-malware software on their computer and phone. Another option is to avoid ads by installing an ad blocker extension such as uBlock Origin, a free and open-source browser extension for content filtering, including ad blocking. Some consumers may also opt to install a privacy browser such as Aloha, Brave, DuckDuckGo or Ghostery on their personal devices. Many privacy browsers have embedded ad blockers; consumers may still see sponsored ads, but they will see fewer of them, which minimizes the chances of malvertising.
Consumers who come across suspicious ads should report them to the applicable search engine for investigation and removal if deemed malicious, Collis said. This can help protect other people from being ensnared.
Proper safety precautions are especially important since there are millions of ads on the internet and cyber thieves are relentless. “You should assume that this could happen to you no matter how careful you are,” Madnick said.
Synopsys logo is seen displayed on a smartphone with the flag of China in the background.
Sopa Images | Lightrocket | Getty Images
The U.S. government has rescinded its export restrictions on chip design software to China, U.S.-based Synopsys announced Thursday.
“Synopsys is working to restore access to the recently restricted products in China,” it said in a statement.
The U.S. had reportedly told several chip design software companies, including Synopsys, in May that they were required to obtain licenses before exporting goods, such as software and chemicals for semiconductors, to China.
The U.S. Commerce Department did not immediately respond to a request for comment from CNBC.
The news comes after China signaled last week that they are making progress on a trade truce with the U.S. and confirmed conditional agreements to resume some exchanges of rare earths and advanced technology.
The Datadog stand is being displayed on day one of the AWS Summit Seoul 2024 at the COEX Convention and Exhibition Center in Seoul, South Korea, on May 16, 2024.
Chris Jung | Nurphoto | Getty Images
Datadog shares were up 10% in extended trading on Wednesday after S&P Global said the monitoring software provider will replace Juniper Networks in the S&P 500 U.S. stock index.
S&P Global is making the change effective before the beginning of trading on July 9, according to a statement.
Computer server maker Hewlett Packard Enterprise, also a constituent of the index, said earlier on Wednesday that it had completed its acquisition of Juniper, which makes data center networking hardware. HPE disclosed in a filing that it paid $13.4 billion to Juniper shareholders.
Over the weekend, the two companies reached a settlement with the U.S. Justice Department, which had sued in opposition to the deal. As part of the settlement, HPE agreed to divest its global Instant On campus and branch business.
While tech already makes up an outsized portion of the S&P 500, the index has has been continuously lifting its exposure as the industry expands into more areas of society.
Stocks often rally when they’re added to a major index, as fund managers need to rebalance their portfolios to reflect the changes.
New York-based Datadog went public in 2019. The company generated $24.6 million in net income on $761.6 million in revenue in the first quarter of 2025, according to a statement. Competitors include Cisco, which bought Splunk last year, as well as Elastic and cloud infrastructure providers such as Amazon and Microsoft.
Datadog has underperformed the broader tech sector so far this year. The stock was down 5.5% as of Wednesday’s close, while the Nasdaq was up 5.6%. Still, with a market cap of $46.6 billion, Datadog’s valuation is significantly higher than the median for that index.
A representation of cryptocurrency Ethereum is placed on a PC motherboard in this illustration taken on June 16, 2023.
Dado Ruvic | Reuters
Stocks tied to the price of ether, better known as ETH, were higher on Wednesday, reflecting renewed enthusiasm for the crypto asset amid a surge of interest in stablecoins and tokenization.
“We’re finally at the point where real use cases are emerging, and stablecoins have been the first version of that at scale but they’re going to open the door to a much bigger story around tokenizing other assets and using digital assets in new ways,” Devin Ryan, head of financial technology research at Citizens.
On Tuesday, as bitcoin ETFs snapped a 15-day streak of inflows, ether ETFs saw $40 million in inflows led by BlackRock’s iShares Ethereum Trust. ETH ETFs came back to life in June after much concern that they were becoming zombie funds.
The price of the coin itself was last higher by 5%, according to Coin Metrics, though it’s still down 24% this year.
Ethereum has been struggling with an identity crisis fueled by uncertainty about the network’s value proposition, weaker revenue since its last big technical upgrade and increasing competition from Solana. Market volatility, driven by geopolitical uncertainty this year, has not helped.
The Ethereum network’s smart contracts capability makes it a prominent platform for the tokenization of traditional assets, which includes U.S. dollar-pegged stablecoins. Fundstrat’s Tom Lee this week called Ethereum “the backbone and architecture” of stablecoins. Both Tether (USDT) and Circle‘s USD Coin (USDC) are issued on the network.
BlackRock’s tokenized money market fund (known as BUIDL, which stands for USD Institutional Digital Liquidity Fund) also launched on Ethereum last year before expanding to other blockchain networks.
Tokenization is the process of issuing digital representations on a blockchain network of publicly traded securities, real world assets or any other form of value. Holders of tokenized assets don’t have outright ownership of the assets themselves.
The latest wave of interest in ETH-related assets follows an announcement by Robinhood this week that it will enable trading of tokenized U.S. stocks and ETFs across Europe, after a groundswell of interest in stablecoins throughout June following Circle’s IPO and the Senate passage of its proposed stablecoin bill, the GENIUS Act.
Ether, which turns 10 years old at the end of July, is sitting about 75% off its all-time high.
Don’t miss these cryptocurrency insights from CNBC Pro: