cross-posted from: https://lemmy.ml/post/4912712

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google’s Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don’t click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

  • Cheradenine@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    81
    ·
    edit-2
    1 year ago

    Don’t use google search, if you do, do not follow ‘sponsered’ links. Not only may they be malware, as in this case, but google will be tracking you.

    It’s truly amazing that google gives no fucks whatsoever when it comes to ads, yet their threat security team is one of the best in the business.

    After works drinks must be fun…

    • lobut@lemmy.ca
      link
      fedilink
      arrow-up
      19
      ·
      1 year ago

      I remember my coworkers (who were devs) Google searched Firefox to download and hit the first link which was an ad. It was a German version of Firefox with spyware.

      Our IT department caught it but I was sorta surprised my coworkers hit the link as opposed to the first search term. That ad was active for a long time though … I think years.

  • Semi-Hemi-Demigod@kbin.social
    link
    fedilink
    arrow-up
    39
    ·
    1 year ago

    I can’t believe we’ve gotten to the point where running random code on your computer isn’t just considered normal, we also think blocking said random code is bad for business.

  • Melody Fwygon@lemmy.one
    link
    fedilink
    English
    arrow-up
    25
    ·
    1 year ago

    I’ve been using a SearXNG locally-hosted instance using WSL/Podman. Behind a VPN of course; and also using TrackMeNot to generate a steady slow stream of garbage searches to block general query tracking.

    I’m loving it to bits; as I don’t have bullshit in my search results and I immediately find what I need; as I can query all the engines I want.

      • Melody Fwygon@lemmy.one
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        1 year ago

        I don’t know the exact requirements but I’m literally running a locally hosted one on a much more previous generation CPU (i7-7820HK) and I appear to be using no more than 4GB of ram including Podman Desktop, WSL and the Docker image itself not seeming to consume that much RAM.

        I don’t feel as if you could possibly lack the system resources needed to do it comfortably if you have at least 12GB of ram (for locally hosting on Windows 10) or 4GB of ram (Any flavor of Linux probably, if you wanna throw an old PC or rPi/rPi-like at it.)

        You should look closely at https://github.com/searxng/searxng and find out what the exact requirements could be by asking the maintainers.

  • halcyondays@midwest.social
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 year ago

    Seen a few mentions of ad blocking, but I’ll throw one more option out there - DNS servers that block malware and c2 domains. I use quad9 as the upstream for my pihole, but cloudflare’s 1.1.1.2 is an option as well.

  • ebits21@lemmy.ca
    link
    fedilink
    English
    arrow-up
    8
    ·
    1 year ago

    Use pihole. If I accidentally click a google ad they don’t work anyway.