Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 Tristen Epps and the Scrambled Egg Revelation 56:04
Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search
Manage episode 490553544 series 3645080
In this eye-opening episode, we break down a sophisticated new trend in tech support scams (TSS) that’s catching even the most cautious users off guard.
Scammers are now hijacking Google Ads and manipulating search results to funnel users—who are simply looking for help—to malicious phone numbers injected directly into legitimate websites like Apple, Microsoft, Netflix, and major banks. Clicking on what appears to be an official Google Ad can land you on a real brand page — but with a fake tech support number secretly inserted into the URL path or internal search results.
We’ll dive into:
- How scammers use Google Ads as a primary conduit for distributing rogue tech support ads.
- The alarming tactic of injecting fraudulent phone numbers into real company websites.
- Why even Fortune 500 companies are vulnerable to these attacks — with 86% of the top 50 companies affected.
- The shift from “aggressive” pop-up-based scams to “passive” professional-looking scam pages that evade detection for longer.
- How black hat SEO and support domains are driving long-lived scam infrastructure.
- The persistent financial motivation behind these scams — and why many victims end up giving remote access to their devices or sharing sensitive banking details.
We’ll also cover what law enforcement and cybersecurity experts are doing to counter this new wave of scams, why detection remains so challenging, and practical tips that users and defenders can take to protect themselves.
If you’ve ever searched for tech support online — or know someone who has — this is an episode you won’t want to miss.
269 episodes
Manage episode 490553544 series 3645080
In this eye-opening episode, we break down a sophisticated new trend in tech support scams (TSS) that’s catching even the most cautious users off guard.
Scammers are now hijacking Google Ads and manipulating search results to funnel users—who are simply looking for help—to malicious phone numbers injected directly into legitimate websites like Apple, Microsoft, Netflix, and major banks. Clicking on what appears to be an official Google Ad can land you on a real brand page — but with a fake tech support number secretly inserted into the URL path or internal search results.
We’ll dive into:
- How scammers use Google Ads as a primary conduit for distributing rogue tech support ads.
- The alarming tactic of injecting fraudulent phone numbers into real company websites.
- Why even Fortune 500 companies are vulnerable to these attacks — with 86% of the top 50 companies affected.
- The shift from “aggressive” pop-up-based scams to “passive” professional-looking scam pages that evade detection for longer.
- How black hat SEO and support domains are driving long-lived scam infrastructure.
- The persistent financial motivation behind these scams — and why many victims end up giving remote access to their devices or sharing sensitive banking details.
We’ll also cover what law enforcement and cybersecurity experts are doing to counter this new wave of scams, why detection remains so challenging, and practical tips that users and defenders can take to protect themselves.
If you’ve ever searched for tech support online — or know someone who has — this is an episode you won’t want to miss.
269 episodes
All episodes
×
1 ReVault: Critical Dell Firmware Flaws Allow Windows Login Bypass and Persistent Implants 48:07

1 Air France–KLM Data Breach Exposes Customer Info via Compromised Third-Party Platform 36:56

1 Critical Flaws in CyberArk Conjur and HashiCorp Vault Put Enterprise Secrets at Risk 37:29

1 Prompt Injection Nightmare: Critical AI Vulnerabilities in ChatGPT, Copilot, Gemini & More 56:52

1 From Google to LVMH: ShinyHunters’ Salesforce Breaches Spark Global Ransom Crisis 46:37

1 Cisco Hit by Vishing Attack: CRM Breach Exposes Millions of User Profiles 31:43

1 Ox Security Unveils Agent Ox: AI Tool That Writes Tailored Fixes for Software Vulnerabilities 52:37

1 Meta Deletes 6.8 Million Scam Accounts as AI-Powered Fraud Rings Exploit WhatsApp 34:45

1 Meta Found Liable: Jury Rules Against Tech Giant in Flo Health Privacy Case 30:59

1 TSMC Insider Threat: Six Arrested in Taiwan Over 2nm Chip Trade Secrets 1:06:45

1 Approov Secures £5M to Fortify Mobile App and API Security Against AI-Driven Threats 55:37

1 Pwn2Own Ireland 2025: $1M WhatsApp Exploit Bounty Raises the Stakes 1:07:32

1 Nvidia Triton Inference Server Vulnerabilities Expose AI Infrastructure to Attack 1:02:48

1 CISA & FEMA Release $100M in Cybersecurity Grants to Strengthen State, Local, and Tribal Defenses 43:50

1 AI Jailbreaks on the Rise: How Hackers Are Extracting Training Data from LLMs 1:26:28

1 350,000 Patient Records Exposed: Inside the Northwest Radiologists Data Breach 40:18

1 Critical Honeywell Experion PKS Vulnerabilities Threaten Global Industrial Control Systems 1:16:35

1 Auto-Color Linux Malware Exploits SAP Zero-Day CVE-2025-31324 36:36

1 Inside the July 2025 PyPI Phishing Scam: How Hackers Stole Developer Credentials 54:17

1 IoT Security Crisis: Dahua Smart Camera Vulnerabilities Expose Surveillance Systems 1:02:05

1 Dropzone AI Secures $37M to Tackle Alert Fatigue with Autonomous SOC Analysts 17:11

1 Axonius Buys Cynerio for $100M+: Closing Healthcare’s Biggest Cybersecurity Blind Spot 1:36:30

1 Critical Lenovo Firmware Flaws Expose Millions to Persistent UEFI Attacks 42:00

1 Promptfoo Secures $18.4M to Combat AI Security Threats in Generative AI 36:50

1 1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster 23:58

1 Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis 1:16:30

1 Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control 1:23:13

1 Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline 24:25

1 Neferpitou Claims Cyberattack on French Naval Defense Giant 44:17

1 Root Evidence Launches With $12.5M to Redefine Vulnerability Management 36:51
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.