Google Scam Targets Australian Cat Owners

Australian Cats Google Scam Targets Cat Owners in Australia

Google Users Warned About Searching for This Specific Cat Breed in Australia

Cybersecurity experts are warning Google users to avoid searching for the phrase “Are Bengal cats legal in Australia” as it has become a conduit for phishing scams that could compromise personal data. Hackers are reportedly targeting users who search for this specific phrase, directing them to malicious websites that steal sensitive information. This is the latest example of “search engine poisoning,” a technique where cybercriminals manipulate search engine results to lure users into their traps.

How the Scam Works

When users type in “Are Bengal cats legal in Australia” on Google, they may encounter certain search results designed to look like legitimate resources. However, some of these results are “poisoned” — they are crafted by hackers who manipulate the SEO (Search Engine Optimization) of their malicious sites to appear higher in search results. Unsuspecting users who click on these malicious links are redirected to fraudulent sites that prompt them to enter sensitive details, potentially handing over valuable data to cybercriminals.

In this specific campaign, experts have identified a connection to the notorious Gootloader malware, which has been deployed in similar attacks globally. Once on these sites, users are either encouraged to download files under the pretense of accessing a “secure PDF” or enter personal details to continue reading. Downloading any files or submitting personal information on these pages may result in direct exposure to malware, which can compromise financial accounts, personal information, and even work-related credentials.

The Role of Search Engine Poisoning in Hacking Attacks

This tactic, known as search engine poisoning, is not new but has become more sophisticated. Cybercriminals understand the types of searches that generate curiosity and use these trends to create traps for potential victims. By flooding search engines with links to malicious sites related to popular questions — such as the legality of Bengal cats in Australia — they increase their chances of luring curious individuals. This type of hacking has proven successful, as users often assume that high-ranking results are safe.

Once on a malicious page, users’ computers and networks are at risk. Hackers may plant malware capable of logging keystrokes, capturing screenshots, and even gaining administrative control over a device, putting both personal and professional data in jeopardy.

The Cost of Falling Victim to a Phishing Scam

For internet users, especially those in professional fields, this attack is a strong reminder of the importance of online vigilance. According to IBM, the average cost of a data breach in 2024 rose to a record $4.88 million, reflecting the increasingly high stakes of cybersecurity threats. Cybercrime tactics continue to evolve, exploiting even the most innocent of online behaviors.

SUPERAntiSpyware advises users to verify any unfamiliar link, avoid downloading unverified files, and use anti-phishing tools to stay secure online. For the most comprehensive defense, why not try our Professional X Edition?

Watch out for fake PayPal “unable to complete your recent transactions” phishing emails!

Phishing Emails Watch out for fake PayPal

We here at SUPERAntiSpyware have noticed a fairly recent clever email phishing campaign that claims to be PayPal. In the email the fake PayPal scam artists attempt to scare users into thinking that not only have their recent PayPal payments been declined, there is also unusual selling activities and they “will need some more information” about your recent sales in attempt to steal your information.

Example of the phishing email

Phishing Emails

We here at SUPERAntiSpyware recommend you simply delete this email, and do not click any links within the email, especially the fake blue “Check Your Accounts” button. If you have been scammed by this email, immediately change your PayPal account password and consider looking into changing your spam settings to avoid future spam emails such as these. Remember, if you do not recognize the sender address, do not open the email, and if you do open an email such as this always hover your mouse pointer over the emails links to see where they’re trying to take you, usually phishing emails links will point you to a website that has nothing to do with the company they’re posing as.

Watch out for fake Office 365 phishing emails!

that claims to be Microsoft attempting to inform users their Office account email storage space is almost full and to prevent incoming/Outgoing mail from getting bounced back, to click the supplied link to add an additional 10 gigs of free and mandatory storage. This of course is an obvious scam to phish your password as the link takes you to a fake Office 365 login screen.

Example of the spam. Beyond the obvious sketchy character of the email, hovering over the links within the email with your mouse pointer clearly shows it takes you to a different website and not a Microsoft website.

We here at SUPERAntiSpyware recommend you simply delete this email, and do not click any links within the email. If you have been scammed by this email, immediately change your Office 365 account password and consider looking into changing your spam settings to avoid future spam emails such as these. Remember, if you do not recognize the sender address, do not open the email, and also if you do open an email always hover your mouse pointer over the emails links to see where they’re trying to take you.

Watch out for fake USPS delivery emails!

usps

Fake USPS Delivery Emails?

We at SUPERAntiSpyware have been alerted to scam emails hitting users claiming to be from the US Postal Service (USPS) that contains a link that will infect them with malware. One of the emails being used by this scam is notice@ussp(DOT)com

The subject line of the email will typically be titled “Delivery notification – Parcel delivery *NUMBER* failed” containing a message that the user please call the number on the shipping notice we left at your doorstep (which there will be none!) to arrange a new delivery, and a link which you can view the delivery notice online, on the USPS website.

This is a fake link to a malware infested website.

If you see a link in a suspicious email such as this do not click the links or open the attachments no matter how innocent they sound. If it claims to be from an official organization, call them and ask if the email is legit. Better safe than sorry!

“The HoeflerText Font Wasn’t Found” Google Chrome Malware Scam – What it is and how to avoid it!

HoeflerText Font Wasn’t Found ?

You are browsing the web and accidentally land on a website with nonsensical characters instead of letters and you receive a prompt to download a missing font in order to read the website. You are told in order to fix the error and display the text, you have to update the “Chrome Font Pack”. Whatever you do, please do not click that blue Update button!

HoeflerText
Fake Google Chrome Prompt asking you to install the malware

It is a scam designed to trick users into installing malware onto their systems. This malware is ranging from Ransomware, to Trojans, to various adware bundles.

How to avoid it

The fake dialogue box informing you that the “The HoeflerText Font Wasn’t Found” will claim you are using Chrome version 53 even if you are not using that version, which tells you something isn’t right and that the prompt you are seeing is fake.

Make sure you are using the latest version of Google Chrome which you can download by clicking here

Make sure you are also using the latest version of SUPERAntiSpyware with Real-Time Protection enabled, a feature only available for SUPERAntiSpyware Professional users.

Tax Season is here – Watch out for Identity Stealing Spyware!

Taxes The Season is Here !

Keep your personal information safe this tax season by doing a Free scan with SUPERAntiSpyware Free Edition

We want to remind everyone that tax season is the time of increased attacks in the forms of spyware, various methods of phishing , and scams. Spyware and Malware authors significantly increase their activity during the tax season in order to try to steal data and withdraw money from bank accounts, steal credit cards, passwords, and other malicious acts.

Watch out for Identity Stealing Spyware!

During this tax season its important to do a few things to help protect yourself online:

1) Make sure your Operating System and software applications such as web browsers and email clients are up to date.

2) Run a Complete Scan with SUPERAntiSpyware regularly with the latest updates, at least twice a week during this period of increased activity.

3) Be cautious before visiting strange websites, or opening strange email attachments. Think before you click!

4) Manually erase, or use privacy software, to delete sensitive data from you PC. Spyware cannot steal what isn’t there!

5) Lookout for spam phishing email impersonating government, bank, or tax company officials asking for sensitive information.

Do you have any security recommendations that help you stay safe during the tax season? Feel free to leave a comment below!

SUPERAntiSpyware Team