A phishing campaign targeted Lowe’s employees in mid-August through malicious Google ads impersonating the company’s HR portal, MyLowesLife. Employees searching for the portal were redirected to fraudulent ads leading to lookalike domains designed to steal login credentials. These domains featured AI-built templates to appear legitimate while evading detection by hosting providers. Despite the suspicious nature of ads for an internal portal, many victims overlooked the discrepancy, resulting in compromised credentials.
The phishing sites mimicked the structure of the real MyLowesLife portal, collecting Sales Numbers, Passwords, and security answers from unsuspecting users. Once credentials were entered, victims were redirected to the actual Lowe’s portal, giving the impression of a system glitch. The stolen credentials are likely sold to other cybercriminals, as suggested by the tactics employed. This campaign also used multiple fake domains like “myloveslife[.]net” and “mylifelowes[.]org” to enhance the deception.
The use of AI to create generic website templates was a deliberate strategy to avoid raising suspicion during investigations. These fake sites, appearing as benign retail templates, made it difficult to convince domain registrars to suspend them. The ads themselves, from multiple fraudulent accounts, blended into regular search results, exploiting user trust in sponsored links. Lowe’s employees were advised to avoid clicking on sponsored results and instead use bookmarks for direct access to the portal to mitigate future risks.
The campaign has since been reported to Google and taken offline. However, the incident underscores the dangers of brand impersonation in malvertising and the importance of vigilance. Cybersecurity experts emphasize relying on official website links and avoiding shortcuts via search engines. Lowe’s continues to monitor the situation, prioritizing the safety of its employees’ data and urging caution when accessing online services.
Reference: