![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgI2N1BV9B2oinjvzQLikBcYsivultrBSKrjTZtBh7g_ovCExjPx9QbL1c1UT_i2OsNCIaWFB7pXx3DrrrwLtEyUq1VebH6bWeiew3ukt1BdO43P_FNfPGy2J2e3cGM4URiy8LtzJRk57Tp3jzo39NN-xHXWxwdzwbmFBG5-QdJ5tsfvoOW7pTvZ9qFr-kp/s1600/malware.png)
A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to deliver a previously unknown backdoor dubbed MadMxShell.
“The threat actor registered multiple look-alike domains using a typosquatting technique and leveraged Google Ads to push these domains to the top of search engine results targeting specific search keywords, thereby
Source:: The Hackers News