7th case of a Weekend AdWords Phishing Ad for AdWords account logins[ Edited ]
November 2015 - last edited November 2015
As I searched just now "adwords community" from my location in Bucharest, Romania, I spotted a new AdWords phishing Ad in the Top 1 position.
The display URL is www.google-acounts.com/Adwords
which redirects to this final URL http://adworrd-gooogle-com.orientme.com.br/Adwords/
So again a question pops up : how are they able to save and AdWords ad when the display URL has a different domain than the Final URL ?
And another big question : why is google not allocating employees for chat support during weekends, to allow people like me to report such phishing ads much faster ?
This attitude of "we don't care about our users during the weekends" is an important vulnerability allowing the theft of who knows how many logins.
Please hire a 24/7 security team for your own main product.
How embarassing is to have stuff stolen from your paying customers (their login data) from people using your own product , an AdWords Ad ! Wake up Google people and do something. It is the 7th AdWords phishing Ad I have personally seen lately.
The pshishing Ad click ID is :
@MosheTLV Please forward this to someone who cand take down the AdWords ad fast
Since I can't seem to find an "Upload image" button in this new editor , here are the screenshots of the pshishing AdWords Ad and landing page :
Re: 7th case of a Weekend AdWords Phishing Ad for AdWords account logi
When support channels are closed, Google has set a direct reporting channel which alerts the "phishing squat" at Google; Please use it.
I have forwarded this case Google.
Did you find any helpful responses or answers to your query? If yes, please mark it as the ‘Best Answer’