this post was submitted on 14 Sep 2023
193 points (98.5% liked)

Technology

34870 readers
53 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
 

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 4 points 1 year ago (2 children)

Presumably you can hover over the link to see the actual URL (which I think is best practice anyway), or is it more sophisticated than that?

[–] [email protected] 9 points 1 year ago (1 children)

AFAIK even legitimate ad clicks will first direct to an analytics platform before redirecting to the destination site, so that they can track click through rates and where the referral came from. So it is unlikely that ad links will actually go to the website you expect them to even in normal scenarios. It is actually this mechanism that the malicious ads described in the article are using to fake the display URL.

[–] [email protected] 4 points 1 year ago

I would always out of habit avoid any links that go to somewhere other than the advertised destination - so if it goes to an analytics platform I would copy and paste the text if the text of the link is a URL, or find an alternative. Always hovering links and being absolutely sure of where they go should really be taught as standard practice.

[–] [email protected] 0 points 1 year ago (2 children)

I always check the status bar but I actually noticed the other day on LinkedIn or maybe Facebook, that the status bar said one thing, but the link was different,

E.g the hover over said https://website.com but the actual link was something like https://linkedin.com/linkout/wbdjdhgaj?user=xhedb

[–] [email protected] 3 points 1 year ago (1 children)

That type of thing is concerning. What browser are you using out of interest?

[–] [email protected] 1 points 1 year ago (1 children)

Sorry for the slow reply, but it was a link on LinkedIn and I'm using chrome. It's frustrating as I use the status bar to check the link is the same as the text before clicking it.

[–] [email protected] 1 points 1 year ago (2 children)

That's trivial to do where you control the link text. For example: https://www.google.com/

[–] [email protected] 1 points 1 year ago (1 children)

Sorry, I don't mean the link text itself, but the destination shown in the status bar in the bottom left of my desktop browser.

[–] [email protected] 1 points 1 year ago (1 children)

Yeah that shouldn't be possible on a platform like LInkedin or Facebook. If it's a site you control, though, it's still easy. I can't do it here (at least I hope I can't) but here's an example of it: https://jsfiddle.net/z2pLaxto/1/

[–] [email protected] 1 points 1 year ago

Yes, that looks exactly like what is happening. For clarity though it is a LinkedIn script not one uploaded by a 3rd party.

It seems to apply to links sent in direct messages which are routed through a linkedin internal page, I assume so they can track you out etc.

It was more the principal of it though, I hadn't considered that the link shown in the status bar could not be the link you would be taken to if you click it but I guess that's part of allowing javascript to run.

[–] [email protected] 1 points 1 year ago

Here is an alternative Piped link(s):

https://www.google.com/

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source, check me out at GitHub.