
Scam ads targeting Usual Protocol emerge on Google
By Vivian Nguyen
Decentral Media and Crypto Briefing reported on December 28, 2024, that Scam Sniffer analysts have identified fraudulent Google ads impersonating Usual Protocol, which redirect users to fake websites designed to steal crypto assets.
According to the reports, these malicious advertisements appear at the top of Google search results when users search for “Usual Protocol,” effectively positioning themselves above the legitimate website. These ads closely mimic Usual Protocol’s branding and language to deceive users into believing they are authentic.
The placement of these scam ads can potentially lead users to click on them as many tend to trust the first few results they see in Google search rankings. Victims who fall prey to these deceptive ads will be directed to a fake website that attempts to gain access to their digital assets through two primary methods: requesting wallet connections from services like MetaMask or Trust Wallet, and prompting users to sign malicious transactions that transfer assets to scammers.
Scammers are increasingly leveraging Google’s advertising platform to create malicious ads that lead users to fake websites. They often bid on keywords related to popular wallets and platforms, creating ads that closely mimic legitimate services. Once users click on these ads, they will be redirected to phishing sites that appear authentic but are designed to harvest sensitive information like wallet passphrases.
In a similar incident earlier this week, Scam Sniffer reported a scam targeting Pudgy Penguin users through malicious Google ads containing suspicious JavaScript code that detects crypto wallets.
Source: cryptobriefing.com