This tool helps cybercriminals scam users through Google ads

Published: (February 25, 2026 at 12:00 PM EST)
2 min read

Source: Mashable Tech

Security researchers have warned of a sophisticated cloaking platform that lets bad actors maneuver around automated security protocols and spoof brands on Google ad platforms. The service, referred to as 1Campaign, provides hackers with a one‑stop‑shop for running malicious ads and enabling fraud “at scale,” according to a recent report by cybersecurity company Varonis.

Overview

Using a single dashboard, hackers can cloak malicious content from security researchers, ad platform reviewers, and automated scanners—who instead see a benign white page—and target general users with phishing or scam attempts. This capability fuels the practice commonly known as malvertising.

Features

  • Real‑time analytics and visitor profiling
  • Fraud scoring and traffic‑blocking options that can configure content for known security vendors, data centers, and VPNs to evade detection (reported by Tech Radar)
  • Logging of IP addresses, geographic locations, company information or ISP, device type, security flags, and assignment of a “fraud score” to each visitor, which is then used to serve targeted content

Development and History

1Campaign was developed by a hacker known as “DuppyMeister.” It has been available on the cybercriminal market for the last three years. The developer provides support for the service through secret Telegram channels. Varonis’ Threat Lab found that the tool has an extremely high success rate at bypassing traditional detection methods.

Impact and Recent Incidents

  • Hackers have been manipulating search engines, including agentic browsers and chatbots, to surface malicious ads and hide malware in plain sight. See the example of chatbots being tricked in this Engadget article.
  • Bitdefender recently warned of a hacker network that compromised 35 Google Advertiser accounts and launched hundreds of malicious ads targeting Mac users searching for specific software downloads. Details are available in the CyberNews report.
0 views
Back to Blog

Related posts

Read more »