{"id":43901,"date":"2026-02-25T04:11:50","date_gmt":"2026-02-24T20:11:50","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/25\/1campaign-platform-helps-malicious-google-ads-evade-detection\/"},"modified":"2026-02-25T04:11:50","modified_gmt":"2026-02-24T20:11:50","slug":"1campaign-platform-helps-malicious-google-ads-evade-detection","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/25\/1campaign-platform-helps-malicious-google-ads-evade-detection\/","title":{"rendered":"1Campaign platform helps malicious Google ads evade detection"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/01\/15\/Google-Ads.jpg\" width=\"1600\" alt=\"1Campaign platform helps malicious Google ads evade detection\"><\/p>\n<p>A newly identified cybercrime service known as 1Campaign is enabling threat actors to run malicious Google Ads that remain online for extended periods while evading scrutiny from security researchers.<\/p>\n<p>1Campaign is a cloaking service that passes Google&rsquo;s screening process and shows malicious content only to real potential victims. Security researchers and automated scanners are served benign white pages.<\/p>\n<p>The operation has been active for at least three years and is managed by a developer using the name&nbsp;&lsquo;DuppyMeister,&rsquo; according to a report from data security company Varonis.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"1Campaign platform helps malicious Google ads evade detection\"><\/a> <\/div>\n<p>&ldquo;The tool passes Google&#8217;s screening, filters out security researchers, and keeps phishing and crypto drainer pages online for as long as possible, funneling real users to attacker-controlled sites,&rdquo; the researchers say.<\/p>\n<p>1Campaign provides &ldquo;customers&rdquo; with a user-friendly dashboard where they can get an overview of their operations and set the parameters for their campaigns.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"483\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/dashboard.jpg\" width=\"900\" alt=\"1Campaign platform helps malicious Google ads evade detection\"><figcaption><strong>1Campaign dashboard<\/strong><br \/><em>Source: Varonis<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The platform can filter visitors in real time, directing traffic to landing pages based on predefined criteria, including geography, internet service provider (ISP), and device characteristics.<\/p>\n<p>The researchers say that this targeted approach allows attackers to concentrate on users in regions where the phishing lure is relevant, while filtering out traffic from countries with a higher likelihood of security scrutiny or scanning activity.&nbsp;<\/p>\n<p>In one instance, Varonis observed aggressive filtering that blocked 99.4% of 1,676 visitors accessing the malicious ads. This translates into a success rate of just 0.6%, or 10 visitors.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"480\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/1campaign-platform-helps-malicious-google-ads-evade-detection\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"900\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/block.jpg\" alt=\"1Campaign platform helps malicious Google ads evade detection\"><figcaption><strong>Fraud scores assigned to visitors<\/strong><br \/><em>Source: Varonis<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The system evaluates each visitor and assigns a fraud risk score between 0 and 100. This reflects the&nbsp;likelihood of non-genuine visitors, and is derived from checking infrastructure details such as cloud providers, data centers, VPNs, and security vendors.<\/p>\n<p>&#8220;Visitors from Microsoft Corporation, Google, Tencent Cloud Computing, OVH Hosting, and other cloud providers are automatically flagged with high fraud scores and blocked,&#8221; Varonis says in a <a href=\"https:\/\/www.varonis.com\/blog\/1campaign\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a> today.<\/p>\n<p>Based on IP address ranges, ISP, and behavioral patterns, the system can also determine if the malicious ads are accessed by security scanners.<\/p>\n<p>Varonis has observed traffic linked to 1Campaign being distributed in the United States, Canada, the Netherlands, China, Germany, France, Japan, Hungary, and Albania.<\/p>\n<p>The cybercrime platform also offers a Google Ads launcher tool that helps operators launch both malicious and benign campaigns. The developer claims that this tool enables bypassing Google&rsquo;s policy limitations and impersonating legitimate brands in ads.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"352\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/1campaign-platform-helps-malicious-google-ads-evade-detection\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"900\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/google%20ads.jpg\" alt=\"1Campaign platform helps malicious Google ads evade detection\"><figcaption><em>Source: Varonis<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Despite Google introducing&nbsp;multiple safeguards, its ad platform is still used to promote fraud, malware, and crypto-drainers. 1Campaign stands out, though, as it is designed specifically to launch malicious ads that pass Google&#8217;s automatic inspection and likely survive until victims report them or the campaign is reported manually.<\/p>\n<p>Such a cloaking system makes static URL scanning less effective. Varonis says that using realistic browser fingerprints and patterns that mimic human interaction would render better analysis and detection results.<\/p>\n<p>For automated detection, Varonis recommends rotating through a diverse IP pool and user-agent configurations to avoid consistent fingerprinting.<\/p>\n<p>Users are advised to avoid promoted search results, or at least treat them with suspicion, and&nbsp;bookmark official software distribution channels.<\/p>\n<p>Double-checking the URL in the address bar is also recommended before entering account credentials or other sensitive information.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/1campaign-platform-helps-malicious-google-ads-evade-detection\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"1Campaign platform helps malicious Google ads evade detection\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/police-arrests-651-suspects-in-african-cybercrime-crackdown\/\">Police arrests 651 suspects in African cybercrime crackdown<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/police-arrests-300-suspects-linked-to-african-cybercrime-rings\/\">Police arrests 300 suspects linked to African cybercrime rings<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/telegram-channels-expose-rapid-weaponization-of-smartermail-flaws\/\">Telegram channels expose rapid weaponization of SmarterMail flaws<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-says-hackers-are-abusing-gemini-ai-for-all-attacks-stages\/\">Google says hackers are abusing Gemini AI for all attacks stages<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hugging-face-abused-to-spread-thousands-of-android-malware-variants\/\">Hugging Face abused to spread thousands of Android malware variants<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A newly identified cybercrime service known as 1Campaig [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43901","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43901"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43901\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}