Get all your news in one place.
100’s of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

Scammers trick over 500,000 victims with fake Google, Bing ads to steal personal info

A laptop on a lap with 100 dollar bills flying out.
  • Payroll Pirates spoofed HR platforms via ads to steal credentials and MFA codes
  • Over 200 platforms were targeted, affecting around half a million users
  • Telegram bots enabled real-time phishing, infrastructure spanned Kazakhstan, Vietnam, and cloaked domains

Scammers have been spoofing payroll systems, credit unions, and trading platforms across the US in a bid to steal login credentials and multi-factor authentication (MFA) codes, experts have warned.

Cybersecurity researchers from Check Point named the perpetrators ‘Payroll Pirates’, who use paid ads on popular networks such as Google or Bing to advertise spoofed payroll and HR portals.

When a victim employee searched for their platform of choice (instead of simply typing in the address in the address bar), they would see the fake site promoted at the top. Those that unknowingly clicked the link and tried to log in effectively relayed their credentials to the attackers.

Returning stronger

Over time, the operation targeted more than 200 platforms and lured in an estimated half a million users, the researchers claim.

The campaign appeared to go dormant in late 2023, but returned in mid-2024 with upgraded phishing kits capable of bypassing two-factor authentication.

Operators used Telegram bots to interact with victims in real time, requesting one-time codes and other security answers. The kits’ backend was also redesigned to hide data exfiltration paths, making the infrastructure much harder to detect or dismantle.

Since the group runs two major infrastructure clusters, Check Point believed this to be multiple different campaigns.

One uses Google Ads and “white page” redirects hosted in Kazakhstan and Vietnam, while the other relies on Bing Ads and aged domains filtered through cloaking services. However, subsequent investigation determined this was all part of a single, unified network. Logs showed at least four administrators managing Telegram channels tied to different targets, such as payroll platforms, credit unions, and healthcare benefits portals.

They even found one of the admins posting a video from Odessa, concluding that at least one of the operators was based in Ukraine. Payroll Pirates remain active, constantly refining their tactics, and targeting anyone whose paycheck moves online, Check Point ultimately warned.

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.