Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Hackers Use Google Ads to Spread AmosStealer

January 22, 2025
Reading Time: 2 mins read
in Alerts
Hackers Use Teams Calls to Deploy Ransomware

Hackers are once again leveraging Google Ads to spread malware, with a new campaign targeting macOS and Linux users through a fake Homebrew website. The campaign utilizes a fake URL, “brewe.sh,” designed to deceive even the most experienced users by appearing to link to the legitimate Homebrew project. When users visit this site, they are prompted to execute a command that appears to install Homebrew, but instead, it installs the AmosStealer malware. This malware is an infostealer that specifically targets over 50 cryptocurrency extensions and web browser data, stealing sensitive credentials and information.

The malicious Google ads redirect users to the fake website, which replicates the legitimate Homebrew installation page.

Once users execute the command on their system, the malware is downloaded and activated, allowing the hackers to access sensitive information. AmosStealer is known for its ability to harvest various types of valuable data, including stored passwords and cryptocurrency wallet information. The malware is offered as a subscription service to cybercriminals, further emphasizing the scale and sophistication of these attacks.

Security researcher JamesWT identified the malware in this campaign and highlighted its dangerous capabilities. Homebrew’s project leader, Mike McQuaid, has acknowledged the situation, expressing frustration over the recurring issue and criticizing Google for its failure to prevent such malicious activity in ads. McQuaid stated that although the ad was eventually taken down, the use of deceptive URLs continues to be a problem, with no reliable solution in sight. The Homebrew team has also expressed concern over the lack of action from Google to address these ongoing threats.

As the malicious ads have been removed, users remain at risk of similar campaigns through other deceptive domains. To protect themselves, Homebrew users are advised to be cautious when clicking on sponsored ads and to verify that they are visiting the legitimate Homebrew website. Additionally, users are encouraged to bookmark trusted sites to avoid falling victim to fraudulent ads in search results, ensuring that they only download software from verified and secure sources.

Reference:
  • Hackers Use Fake Homebrew Site in Google Ads Campaign to Spread AmosStealer
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJanuary 2025
ADVERTISEMENT

Related Posts

Fortinet SSL VPNs hit, then FortiManager targeted

Smart Bus Flaws Allow Spying, Control

August 13, 2025
Fortinet SSL VPNs hit, then FortiManager targeted

Fortinet SSL VPNs hit, then FortiManager targeted

August 13, 2025
Fortinet SSL VPNs hit, then FortiManager targeted

Ukrainian Web3team Targets Job Seekers

August 13, 2025
Yes24 Down After Cyberattack

Win-DDoS Flaws Enable DC DDoS Botnets

August 12, 2025
Yes24 Down After Cyberattack

GPT-5 Jailbreak, Zero-Click AI Threats

August 12, 2025
Yes24 Down After Cyberattack

7-Zip Flaw Enables Arbitrary Code Run

August 12, 2025

Latest Alerts

Smart Bus Flaws Allow Spying, Control

Fortinet SSL VPNs hit, then FortiManager targeted

Ukrainian Web3team Targets Job Seekers

Win-DDoS Flaws Enable DC DDoS Botnets

GPT-5 Jailbreak, Zero-Click AI Threats

7-Zip Flaw Enables Arbitrary Code Run

Subscribe to our newsletter

    Latest Incidents

    Pennsylvania AG Systems Down

    WestJet Confirms June 2025 Data Breach

    EPEC Hacked Social Media

    Columbia Data Breach Hits 900K

    Chinese Gang Hits 115M US Payment Cards

    Yes24 Down After Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial