Close Menu
Savannah HeraldSavannah Herald
  • Home
  • News
    • Local
    • State
    • National
    • World
    • HBCUs
  • Events
  • Directories
  • Weather
  • Traffic
  • Sports
  • Politics
  • Lifestyle
    • Faith
    • Senior Living
    • Health
    • Travel
    • Beauty
    • Fashion
    • Food
    • Art & Literature
  • Business
    • Real Estate
    • Entertainment
    • Investing
    • Education
  • Guides
    • Juneteenth Guide
    • Black History Savannah
    • MLK Guide Savannah
We're Social
  • Twitter
  • Facebook
  • YouTube

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Trending
  • Nearly Half of Italy’s Wolves Are Part Dog Now, Thanks to Hybridization. Is That a Threat to the Species?
  • Do women need to exercise differently from men – and ease up on cardio after 40? | Fitness
  • New Skills to Navigate Continuous Change
  • Timothée Chalamet Chose Knicks Over Met Gala And Kylie
  • TSMC taps wind power as AI chip demand soars, Taiwan feels energy crunch
  • Inside the 15,500 malicious domains secretly using ad trackers to push AI investment scams across the web
  • The ‘Perfect Storm’ Hanging Over Britain’s Public Debt
  • Chocolate-Covered Coconut Easter Eggs – A Classic Twist
Facebook X (Twitter) Instagram YouTube
Login
Savannah HeraldSavannah Herald
  • Home
  • News
    • Local
    • State
    • National
    • World
    • HBCUs
  • Events
  • Directories
  • Weather
  • Traffic
  • Sports
  • Politics
  • Lifestyle
    • Faith
    • Senior Living
    • Health
    • Travel
    • Beauty
    • Fashion
    • Food
    • Art & Literature
  • Business
    • Real Estate
    • Entertainment
    • Investing
    • Education
  • Guides
    • Juneteenth Guide
    • Black History Savannah
    • MLK Guide Savannah
Savannah HeraldSavannah Herald
Home » Inside the 15,500 malicious domains secretly using ad trackers to push AI investment scams across the web
Gaming

Inside the 15,500 malicious domains secretly using ad trackers to push AI investment scams across the web

Savannah HeraldBy Savannah HeraldMay 7, 20263 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
Hacker
Share
Facebook Twitter LinkedIn Pinterest Email

Game On: Latest in Gaming News, Reviews & Industry Buzz

Key takeaways
  • Cloaking became a central layer, using traffic distribution systems to show scams only to targeted victims and hide from scanners.
  • Researchers Infoblox and Confiant found threat actors exploit commercial tracking software to scale routing, filtering, and campaign management.
  • Investment scams lean on AI-themed lures, deploying deepfakes and generative AI to automate multilingual content and rapidly rotate domains.


  • 15,500 domains were actively used to deliver cloaked AI investment scams
  • Cloaking ensures harmful content is shown only to targeted victims
  • Commercial tracking software allows cybercriminals to scale operations without building infrastructure

Cloaking has shifted from a supporting tactic into a central layer of cybercriminal infrastructure, and commercial tools are now widely embedded in cybercrime operations at scale.

A four-month analysis of malicious activity by Infoblox and Confiant identified roughly 15,500 domains linked to malicious tracker deployments.

These domains routed traffic from compromised websites, spam messages, social media channels, and online advertising ecosystems.

Article continues below


You may like

Threat actors exploit commercial tracking software for scale

Rather than building bespoke systems, many threat actors rely on commercial tracking software that already performs filtering, routing, and campaign management functions at scale.

These domains do not simply host scams, but conceal them through cloaking techniques that display harmful content only to intended victims while displaying benign pages to security scanners and others.

Cloaking operates through traffic distribution systems that filter visitors using attributes such as location, device type, and referral source before determining what content is shown.

This allows operators to circumvent advertising restrictions while refining the audience that ultimately sees the scam content.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

The research describes cloaking as “a foundational block of modern cybercrime,” reflecting how deeply integrated it has become within these operations.

It also allows threat actors to shield infrastructure not only from defenders but also from rival groups seeking to hijack campaigns.

Investment scams accounted for the largest share of activity observed across these domains, with a clear emphasis on AI-themed narratives as the primary lure.


What to read next

Pages frequently promote automated trading platforms using phrases such as “Smart AI Trading Technology” or “Intelligent Trading Solutions,” often paired with claims of consistent and unusually high returns.

In several cases, deepfake imagery and fabricated media content are used to reinforce credibility and create a sense of urgency.

Also, generative AI tools are being used to produce large volumes of campaign material programmatically.

This includes headlines, promotional copy, and visual assets that can be deployed across multiple domains with minimal variation.

The result is a scalable content pipeline that supports rapid campaign expansion across languages and regions without requiring substantial manual effort.

Despite domain reporting and account suspensions by researchers and the tracker’s operators, the activity shows little sign of slowing.

Operators continue to rotate domains and reuse the same infrastructure with minimal changes, allowing campaigns to return quickly after disruption.

Thousands of active domains within a short window point to persistent and ongoing activity rather than isolated incidents.

Endpoint protection systems often struggle to detect these campaigns because cloaked content is only revealed after specific conditions are met.

Firewall controls provide limited coverage when traffic is routed through legitimate advertising and web channels.

Malware removal efforts remain reactive, as harm typically occurs only after victims have already been funneled through these delivery paths.

These limitations mean that standard defenses cannot stop these attacks, and the risk from cloaking and tracker abuse remains high.


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Read the full article on the original site


Console News Developer Interviews eSports Highlights Game Development News Game Industry Insights Game Trailers Gaming Accessories Gaming Culture Gaming Reviews Indie Games Mobile Gaming Nintendo Switch PC Gaming PlayStation Updates Retro Games Tech in Gaming Upcoming Releases Video Game News VR Gaming Xbox News
Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
Savannah Herald
  • Website

Related Posts

Gaming May 4, 2026

All Canyon Music Disc Fragments in Far Far West and how to get them – Destructoid

Gaming May 3, 2026

Hero shooter Last Flag halts production just 2 weeks after launch, but vows to “make sure that the game doesn’t disappear”

Gaming May 1, 2026

‘Organizations need to stop workarounds and regain control’: Report finds many firms don’t know what their workers are sharing with AI tools

Gaming April 30, 2026

World Cup 2026: how mobile networks can avoid cybersecurity chaos at kick-off

Gaming April 29, 2026

How to get and use Turbine Compressor in ARC Raiders – Destructoid

Gaming April 27, 2026

Next Assassin’s Creed game reportedly undergoing big changes to make it ‘more grounded’ – Destructoid

Comments are closed.

Don't Miss
Beauty May 1, 2026By Savannah Herald04 Mins Read

From Extra Volume to Full Coverage: How Hair Extensions, Wigs, and Toppers Work Together

May 1, 2026

Glow & Grow: Black Beauty, Haircare, and Skincare Tips Have you ever stood in front…

Reporters at McClatchy Withhold Bylines in A.I. Dispute

May 1, 2026

Sofina Foods expands in Europe with acquisition of Finnebrogue

November 3, 2025

One Pot Poultry Thighs And Rice

November 25, 2025

Huntsville Metro Black Chamber Future Business Owners Tour

September 3, 2025
Archives
  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
Categories
  • Art & Literature
  • Beauty
  • Black History
  • Business
  • Climate
  • Education
  • Employment
  • Entertainment
  • Faith
  • Fashion
  • Food
  • Gaming
  • Georgia Politics
  • HBCUs
  • Health
  • Health Inspections
  • Investing
  • Lifestyle
  • Local
  • Lowcountry News
  • National
  • National Opinion
  • News
  • Politics
  • Real Estate
  • Senior Living
  • Sports
  • State
  • Tech
  • Transportation
  • Travel
  • World
Savannah Herald Newsletter

Subscribe to Updates

A round up interesting pic’s, post and articles in the C-Port and around the world.

About Us
About Us

The Savannah Herald is your trusted source for the pulse of Coastal Georgia and the Low County of South Carolina. We're committed to delivering timely news that resonates with the African American community.

From local politics to business developments, we're here to keep you informed and engaged. Our mission is to amplify the voices and stories that matter, shining a light on our collective experiences and achievements.
We cover:
🏛️ Politics
💼 Business
🎭 Entertainment
🏀 Sports
🩺 Health
💻 Technology
Savannah Herald: Savannah's Black Voice 💪🏾

Our Picks

This Week In Tiger Athletics (Week of March 2nd-7th)

March 12, 2026

Ohio State wouldn’t have called ‘Coach Rob’ to play in the ’70s

May 2, 2026

City Hall to Light Up Pink in Observance of Breast Cancer Awareness Month • Savannah, GA

October 27, 2025

Crochet Throw Blanket in Progress (Scrap Yarn + Moss Stitch)

March 11, 2026

Georgia Football’s Kirby Smart previews No. 5 Ole Miss

October 18, 2025
Categories
  • Art & Literature
  • Beauty
  • Black History
  • Business
  • Climate
  • Education
  • Employment
  • Entertainment
  • Faith
  • Fashion
  • Food
  • Gaming
  • Georgia Politics
  • HBCUs
  • Health
  • Health Inspections
  • Investing
  • Lifestyle
  • Local
  • Lowcountry News
  • National
  • National Opinion
  • News
  • Politics
  • Real Estate
  • Senior Living
  • Sports
  • State
  • Tech
  • Transportation
  • Travel
  • World
  • Privacy Policies
  • Disclaimers
  • Terms and Conditions
  • About Us
  • Contact Us
  • Opt-Out Preferences
  • Accessibility Statement
Copyright © 2002-2026 Savannahherald.com All Rights Reserved. A Veteran-Owned Business

Type above and press Enter to search. Press Esc to cancel.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.

Sign In or Register

Welcome Back!

Login below or Register Now.

Lost password?

Register Now!

Already registered? Login.

A password will be e-mailed to you.