{"id":44008,"date":"2026-02-27T20:27:13","date_gmt":"2026-02-27T12:27:13","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/27\/hackers-use-1campaign-to-hide-malicious-ads-from-google-reviewers\/"},"modified":"2026-02-27T20:27:13","modified_gmt":"2026-02-27T12:27:13","slug":"hackers-use-1campaign-to-hide-malicious-ads-from-google-reviewers","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/27\/hackers-use-1campaign-to-hide-malicious-ads-from-google-reviewers\/","title":{"rendered":"Hackers Use 1Campaign to Hide Malicious Ads From Google Reviewers"},"content":{"rendered":"\n<p>Cybersecurity researchers at Varonis Threat Labs have identified a new platform named 1Campaign, designed specifically to help hackers and scammers trick <a href=\"https:\/\/hackread.com\/google-play-protect-ensures-security-for-android-devices\/\" target=\"_blank\" data-type=\"post\" data-id=\"55478\" rel=\"noreferrer noopener\">Google\u2019s security systems<\/a>, or at least attempt to do so.<\/p>\n<p>This service allows criminals to run fraudulent advertisements that stay online for much longer than usual by hiding their true intent from safety checkers. The platform has been active for over three years, managed by a developer known as <code>DuppyMeister<\/code>, who even provides dedicated help desk support for users.<\/p>\n<h3><strong>How It Works<\/strong><\/h3>\n<p>The main feature of 1Campaign is a technique called cloaking. This involves showing two different versions of a website. When a <a href=\"https:\/\/hackread.com\/tag\/Google\/\" target=\"_blank\" data-type=\"post_tag\" data-id=\"521\" rel=\"noreferrer noopener\">Google<\/a> reviewer or a security bot checks the link, they see a perfectly safe white page. However, when a regular person clicks the same ad, they are redirected to a dangerous site designed to steal cryptocurrency or login details.<\/p>\n<p>Further investigation by Varonis\u2019 threat analysts revealed that the tool is incredibly effective at spotting fake visitors. It uses a fraud score from 0 to 100 to rank every person who clicks, and if the system detects a visitor from a tech company like Microsoft, Google, or Tencent, or someone using a VPN, it automatically blocks them. It is worth noting that in one analysed campaign called <code>Blockbyblockchain<\/code>, which targeted the site <code>bitcoinhorizon.pro<\/code>, the system blocked 99.4% of 1,676 visitors, allowing only 10 real potential victims through.<\/p>\n<div>\n<figure><a href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"400\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-2-1024x400.png\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-2-1024x400.png 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-2-300x117.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-2-768x300.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-2-380x148.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-2-800x313.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-2-1160x453.png 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-2.png 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" alt=\"Hackers Use 1Campaign to Hide Malicious Ads From Google Reviewers\" \/><\/a><figcaption>Promotional ad for 1Campaign (source: Varonis)<\/figcaption><\/figure>\n<\/p><\/div>\n<h3><strong>Targeted Attacks and Global Reach<\/strong><\/h3>\n<p>According to researchers, 1Campaign is part of a worrying rise in user-friendly hacking toolkits. While other toolkits like <a href=\"https:\/\/hackread.com\/spiderman-phishing-kit-european-banks-credential-theft\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spiderman<\/a> or <a href=\"https:\/\/hackread.com\/new-fishxproxy-phishing-kit-script-kiddies\/\" target=\"_blank\" rel=\"noreferrer noopener\">FishXProxy<\/a> focus on targeting banks or avoiding takedowns, 1Campaign is unique because it specifically focuses on abusing Google Ads. This method, known as <a href=\"https:\/\/hackread.com\/fake-microsoft-teams-google-meet-download-oyster-backdoor\/\" target=\"_blank\" rel=\"noreferrer noopener\">malvertising<\/a>, allows attackers to buy legitimate ad space to spread malware or fake software.<\/p>\n<p>The research indicates that these toolkits make it easier than ever for people without technical skills to launch high-level scams. 1Campaign even includes a special launcher that helps attackers bypass strict rules and create ads using any text or words, making it easy to impersonate famous brands. As Daniel Kelley, a researcher involved in the study, explained in the <a href=\"https:\/\/www.varonis.com\/blog\/1campaign\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">blog post<\/a> shared with Hackread.com:<\/p>\n<p>&#8220;1Campaign stands out because it takes many tried-and-true hacker tools and techniques, packages them together, and aims them directly at the biggest online advertiser in the world.&#8221;<\/p>\n<p>Researchers also highlighted the global scale of these operations, with traffic being tracked across the UK, the US, the Netherlands, China, and Germany. By the time a scam is manually reported and taken down, the attackers have often already caused significant financial damage. <\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<figure><a href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-1024x546.png\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-1024x546.png 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-300x160.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-768x410.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-380x203.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-800x427.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads-1160x619.png 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/New-Cloaking-Platform-1Campaign-Helps-Scammers-Hijack-Google-Ads.png 1440w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" alt=\"Hackers Use 1Campaign to Hide Malicious Ads From Google Reviewers\" \/><\/a><figcaption>The main dashboard shows targeted countries (source: Varonis)<\/figcaption><\/figure>\n<p>To stay safe, it is best to treat promoted search results with caution and always double-check the web address before entering any personal data. <\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"Hackers Use 1Campaign to Hide Malicious Ads From Google Reviewers\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers at Varonis Threat Labs have i [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-44008","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/44008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=44008"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/44008\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=44008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=44008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=44008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}