A new phishing campaign has been discovered, targeting Google account credentials through fake Semrush ads. Cybercriminals are taking advantage of the popularity of Semrush, a popular SEO tool, to lure digital marketers. These malicious ads appear legitimate in Google search results, tricking users into clicking them. Once clicked, users are redirected to a fraudulent Semrush login page designed to look exactly like the real one.
The attack utilizes a multi-stage redirection process, which makes detection and takedown difficult for security systems. Victims are first sent to a primary malicious domain, which then redirects them to additional domains. Eventually, the victim lands on a phishing page that mimics the authentic Semrush login page. This deceptive page contains the real Semrush logos, layout, and messaging to give the appearance of legitimacy, tricking users into entering their Google account credentials.
Once users submit their credentials on the fake page, the attackers capture the data and gain access to valuable business information.
This stolen information includes critical data from Google Analytics and Google Search Console, which is often linked to Semrush accounts. Cybercriminals can exploit this data to commit fraud, impersonate businesses, or gain a strategic advantage over competitors. Additionally, attackers can use this stolen information to deceive business partners or vendors into making fraudulent payments.
Semrush is a highly targeted platform due to its vast customer base, which includes 40% of Fortune 500 companies.
With over 117,000 customers, Semrush has become a prime target for scammers looking to exploit the brand’s trustworthiness. The attackers’ goal is to steal credentials and access sensitive business data, which could have significant financial consequences. Security experts are urging users to be cautious when clicking on ads, especially when they redirect to unfamiliar login pages. To reduce the risk of falling victim to such attacks, it’s essential to implement strong security measures, including two-factor authentication and regular account monitoring.