DomainGuard

Google Ads Phishing

Buying paid-search ads on brand keywords to outrank the legitimate site and route the click to a lookalike phishing page. Old technique, still effective.

Three fake phishing sites displayed by Google Ads before the legitimate site.
Three fake phishing sites displayed by Google Ads before the legitimate site.
First Seen
2008
Status
Active in the wild
Phishing Google Ads Lookalike Domain Paid Search 4 min read

What it is

Google Ads phishing is the practice of buying paid search ads against brand or product keywords, then directing the click to a lookalike domain hosting a phishing page. Because the ad sits above the organic results, it intercepts traffic before users ever see the legitimate site.

How it works

  1. Register a lookalike domain that mimics the target brand (ad-wordsgoogle.com, pay-pal-secure.com, and similar variants).
  2. Stand up a clone of the brand’s login or download page on that domain.
  3. Buy a Google Ads campaign bidding on the brand’s own keywords, with ad copy that looks indistinguishable from the legitimate listing.
  4. Outrank the brand’s organic listing, sometimes outranking the brand’s own paid ad. Users click, log in, credentials are captured.

Why it still works

Users trust the top result. The convention of typing a brand name into Google and clicking the first link predates every signal-of-trust feature search engines have shipped since, and it has not changed. Ads inherit that trust without earning it.

The ad-review process is automated, scaled, and reactive. Malicious creative can run for hours, sometimes days, before being pulled, long enough to clear the campaign goals and disappear before manual review catches up.

First documented

The earliest publicly documented case is from 2008, when an attacker bought ads against the keyword “adwords” itself, pointing to ad-wordsgoogle.com, which delivered a malware payload. The irony aside, the technique was already mature: attackers understood the ad model well enough to target the platform that hosted them.

The 2008 domain is still available to register today for anyone who wants to hold onto it for nostalgia.

Signals to watch for

  • New domain registrations matching brand keywords, paired with active Google Ads campaigns on those same keywords.
  • Sudden click traffic from paid search to a brand-adjacent property your organization does not own.
  • User reports of “the website asked me to log in again right after I clicked an ad.”
  • Pixel-perfect clones of your login page appearing on domains that share visual or character similarity with your real domain.

Why it appears here

Eighteen years on, the same attack pattern keeps surfacing. We see fresh variants every week against banks, crypto exchanges, SaaS login portals, and software download pages. The vector has not been closed, and the attacker economics (low cost per impression, high yield per credential captured) have not changed.

Further reading

For the longer-form treatment with examples and reports from the security community, see our blog post on Google Ads Phishing.