Statement on Google Ads Security Breach

Dear Clients and Partners,

On Thursday, May 22, 2025, we identified unauthorized ad campaigns running in 18 Google Ads accounts managed under our MCC. These campaigns were not created or approved by our team and were launched simultaneously across multiple client accounts using high daily budgets.

What Happened

Our investigation indicates that one of our authorized user accounts was compromised—likely through session hijacking or credential theft. While we have found no evidence of phishing or malware, the behavior and timing suggest a targeted breach intended to exploit administrative access. This incident was not caused by negligence or mismanagement, and thanks to our internal systems, we were able to detect the activity quickly and shut it down before it escalated.

Actions Taken

  • Paused and removed all unauthorized campaigns immediately

  • Filed detailed incident reports for each affected account with Google

  • Reset passwords and forced logout for all admin-level users

  • Revoked access tokens and terminated active sessions

  • Audited account change history and user permissions across the MCC

  • Blocked all unapproved third-party app access within our Workspace

  • Verified that 2-Step Verification is enforced across all users

  • Implemented new policies for account access monitoring and third-party authorization

Financial Impact

While most affected accounts incurred minimal charges, one account experienced a fraudulent charge of $354. The campaigns were created with daily budgets as high as $50,000, so our ability to catch and stop them quickly was critical. Google has confirmed that refunds will be issued for all verified fraudulent charges.

Broader Industry Context

Incidents like this are becoming increasingly common. Multiple sources across the ad tech and cybersecurity communities have reported similar cases in which Google Ads accounts—often with 2-Step Verification enabled—were compromised through advanced attack methods, including session hijacking, browser-based exploits, and access token abuse. In many of these cases, attackers gained temporary control of accounts to launch high-budget campaigns promoting fake products or services. If that sounds familiar, it’s because that’s exactly what happened in our case.

These trends highlight how sophisticated and aggressive these attacks have become, and reinforce the importance of layered security and fast detection. Here are several examples:

Ongoing Commitment

We are in continuous communication with Google and are pushing hard for swift reinstatement of all suspended accounts. In the meantime, we’ve reinforced our security posture across every level of our organization. Protecting your ad accounts and your trust remains our top priority, and we will continue to take every step necessary to ensure this never happens again.

Thank you for your continued support and understanding.

—Scott
K9 Cloud

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *