Uniswap and Google: Malicious Google Ads Hit Crypto Users With Wallet Drainers

Uniswap and Google: Malicious Google Ads Hit Crypto Users With Wallet Drainers

Malicious Google Ads Fuel Surge in Crypto Wallet Drain Attacks

Cybercriminals are increasingly exploiting Google Ads to steal cryptocurrency, targeting users searching for legitimate DeFi apps and wallet services. Security firm SEAL has tracked a sophisticated, long-running campaign that evades Google’s automated defenses, draining wallets and harvesting seed phrases through fake versions of trusted platforms.

Since March 2026, SEAL has blocked over 356 malicious ad URLs, with attackers continuously refreshing their infrastructure to bypass takedowns. While Google has suspended identified advertiser accounts, new incidents persist, indicating the abuse remains widespread. Threat actors leverage cloaking and fingerprinting to serve malicious content only to targeted victims, redirecting others to benign pages like Wikipedia or official documentation.

Attackers abuse high-reputation Google domains such as sites.google.com and docs.google.com to create convincing ads that appear indistinguishable from legitimate projects. Behind these façades, malicious payloads are hosted in secondary iframes or off-platform infrastructure, evading automated policy checks. Some campaigns even hijack verified advertiser accounts, including those of major brands, to push fraudulent crypto ads.

The most common attack methods involve drainer-as-a-service tools like Inferno Drainer and Vanilla Drainer, which trick users into signing malicious blockchain transactions in-browser. Other campaigns clone hardware wallet sites (e.g., Ledger) to steal seed phrases or distribute malicious browser extensions via the Chrome Web Store. Drainer operators typically take a 20% cut of stolen funds, enabling less technical criminals to launch large-scale attacks.

Advanced campaigns employ a three-layer web architecture to evade detection. A spoofed front end, often hosted on Arweave-backed domains, mimics legitimate sites like Uniswap, loading assets from trusted sources to appear authentic. Obfuscated payloads, stored on irys.xyz, use runtime code construction to bypass security measures, while a man-in-the-middle proxy reroutes API and RPC traffic through attacker-controlled domains. This allows operators to monitor wallet balances and inject tailored malicious payloads based on a victim’s assets.

Despite efforts by security firms like SEAL, the cat-and-mouse game continues, with attackers rapidly relaunching campaigns under new URLs and ad creatives. The sustained abuse highlights the challenges in fully containing such threats on ad platforms.

Source: https://gbhackers.com/google-ads-hit-crypto-users/

Uniswap Labs cybersecurity rating report: https://www.rankiteo.com/company/uniswaporg

Google cybersecurity rating report: https://www.rankiteo.com/company/google

"id": "UNIGOO1776879280",
"linkid": "uniswaporg, google",
"type": "Cyber Attack",
"date": "3/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Users searching for DeFi/wallet '
                                              'services',
                        'industry': 'Technology/Advertising',
                        'name': 'Google Ads',
                        'type': 'Advertising Platform'},
                       {'customers_affected': 'Users of spoofed services',
                        'industry': 'FinTech/Blockchain',
                        'name': 'Legitimate DeFi/Wallet Services (e.g., '
                                'Uniswap, Ledger)',
                        'type': 'Cryptocurrency Service'},
                       {'industry': 'Cybersecurity',
                        'name': 'SEAL (Security Firm)',
                        'type': 'Cybersecurity'}],
 'attack_vector': ['Malicious Google Ads',
                   'Fake DeFi/Wallet Websites',
                   'Browser Extensions',
                   'Man-in-the-Middle Proxy'],
 'customer_advisories': 'Users advised to verify DeFi/wallet service URLs and '
                        'avoid clicking on ads for such services.',
 'data_breach': {'data_exfiltration': 'Yes (wallet draining, seed phrase '
                                      'harvesting)',
                 'personally_identifiable_information': 'Wallet addresses '
                                                        '(pseudonymous)',
                 'sensitivity_of_data': 'High (cryptocurrency access)',
                 'type_of_data_compromised': ['Seed phrases',
                                              'Wallet credentials',
                                              'Blockchain transaction data']},
 'date_detected': '2026-03',
 'description': 'Cybercriminals are increasingly exploiting Google Ads to '
                'steal cryptocurrency, targeting users searching for '
                'legitimate DeFi apps and wallet services. Security firm SEAL '
                'has tracked a sophisticated, long-running campaign that '
                'evades Google’s automated defenses, draining wallets and '
                'harvesting seed phrases through fake versions of trusted '
                'platforms.',
 'impact': {'brand_reputation_impact': ['Damage to reputation of legitimate '
                                        'DeFi/wallet services',
                                        'Damage to Google Ads platform trust'],
            'data_compromised': ['Seed phrases',
                                 'Wallet credentials',
                                 'Blockchain transaction data'],
            'financial_loss': 'Cryptocurrency stolen (amount unspecified)',
            'identity_theft_risk': 'High (seed phrases and wallet credentials '
                                   'compromised)',
            'operational_impact': 'Loss of user trust in legitimate '
                                  'DeFi/wallet services',
            'payment_information_risk': 'High (cryptocurrency theft)',
            'systems_affected': ['User wallets',
                                 'DeFi platforms',
                                 'Browser extensions']},
 'initial_access_broker': {'entry_point': ['Malicious Google Ads',
                                           'Fake DeFi/Wallet Websites'],
                           'high_value_targets': 'Users searching for '
                                                 'DeFi/wallet services'},
 'investigation_status': 'Ongoing',
 'lessons_learned': 'Challenges in fully containing malicious ad campaigns due '
                    'to rapid attacker adaptation and abuse of high-reputation '
                    'domains. Need for improved detection of '
                    'cloaking/fingerprinting techniques and collaboration '
                    'between ad platforms and security firms.',
 'motivation': ['Financial Gain'],
 'post_incident_analysis': {'corrective_actions': ['Improved detection of '
                                                   'cloaking/fingerprinting in '
                                                   'ads',
                                                   'Stricter vetting for '
                                                   'crypto-related advertisers',
                                                   'Collaboration with '
                                                   'security firms for '
                                                   'real-time blocking',
                                                   'User education on '
                                                   'verifying service '
                                                   'authenticity'],
                            'root_causes': ['Abuse of Google Ads platform for '
                                            'malicious campaigns',
                                            'Cloaking/fingerprinting to evade '
                                            'detection',
                                            'Use of high-reputation domains to '
                                            'bypass automated checks',
                                            'Drainer-as-a-service tools '
                                            'enabling low-skill attackers',
                                            'Three-layer web architecture to '
                                            'obfuscate malicious payloads']},
 'recommendations': ['Enhanced vetting of advertisers for high-risk categories '
                     '(e.g., crypto)',
                     'Real-time monitoring for cloaking/fingerprinting in ads',
                     'Collaboration with security firms to track and block '
                     'malicious infrastructure',
                     'User education on verifying DeFi/wallet service '
                     'authenticity',
                     'Implementation of multi-layered security for blockchain '
                     'transactions'],
 'references': [{'source': 'SEAL (Security Firm)'}],
 'response': {'containment_measures': ['Blocking malicious ad URLs',
                                       'Suspension of advertiser accounts'],
              'enhanced_monitoring': 'Continuous tracking of new malicious ad '
                                     'URLs',
              'remediation_measures': ['Takedown of malicious infrastructure',
                                       'Monitoring for new campaigns'],
              'third_party_assistance': 'SEAL (security firm)'},
 'title': 'Malicious Google Ads Fuel Surge in Crypto Wallet Drain Attacks',
 'type': ['Phishing', 'Malvertising', 'Cryptocurrency Theft'],
 'vulnerability_exploited': ['Cloaking',
                             'Fingerprinting',
                             'Obfuscated Payloads',
                             'Abuse of High-Reputation Domains '
                             '(sites.google.com, docs.google.com)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.