London Mail
  • Home
  • World
  • News
  • Opinion
  • Business
  • Tech
  • Science
  • Sports
  • Lifestyle
  • Health
  • Motering/Cars
  • More
    • Entertainment
    • Travel
    • Crypto
    • Food
    • Home Improvment
      • Real Estate
    • Press Release
No Result
View All Result
  • Home
  • World
  • News
  • Opinion
  • Business
  • Tech
  • Science
  • Sports
  • Lifestyle
  • Health
  • Motering/Cars
  • More
    • Entertainment
    • Travel
    • Crypto
    • Food
    • Home Improvment
      • Real Estate
    • Press Release
No Result
View All Result
London Mail
No Result
View All Result

Urgent warning to Google Chrome users after cyberattack targets browser with fake error messages – here’s how to protect yourself

by London Mail
June 18, 2024
in Science
Reading Time: 7 mins read

Security experts issued a warning to Google Chrome users after uncovering a cyberattack targeting the browser, as well as Microsoft‘s Word and OneDrive apps.

The attack has used fake error messages to trick users into installing the malicious software themselves as a ‘fix.’ 

Hackers are sending notifications through email as well as website pop-ups, which claim the user has experienced a software malfunction and need of a quick update.  

To spot a fake, experts have advised users to be wary of messages that claim a fix will require them to install a ‘root certificate’ by copying and pasting raw code.

While the cyberattack is capable of stealing all manner of private digital data, some of the new malware appears primed for stealing cryptocurrencies, like bitcoin.  

Hackers have a new tactic for sneaking malware onto your computer - fake updates to Google's Chrome browser, as well as Microsoft's Word and OneDrive products

Hackers have a new tactic for sneaking malware onto your computer – fake updates to Google’s Chrome browser, as well as Microsoft’s Word and OneDrive products

The malicious new hacking tactic was uncovered by the prolific cybersecurity firm Proofpoint, founded in 2002 by a former chief technology officer for Netscape. 

The new style of ‘fake error messages,’ they warned, ‘is clever and purports to be an authoritative notification coming from the operating system.’ 

The scheme involves seemingly official prompts from these tech giants, Google and Microsoft, asking users to open what’s known as a ‘command-line shell,’ specifically Microsoft’s version of a command-line tool for Windows, PowerShell.

Command line tools, including Windows PowerShell, are programs designed for more experienced coders to program their own computer’s core code directly. 

The hackers’ fake error messages encourage unwitting users to copy and paste raw code and then install it as a ‘fix’ by running or ‘executing’ that code in PowerShell.

Cyber security experts have only seen these hackers deploy this specific ‘fake fix’ scheme via PowerShell, so Apple iOS users should be able to rest easy for now.

The scheme involves seemingly official prompts - like the one pictured above - asking users to open what's known as a 'command-line shell,' a form of software that allows more experienced coders to program their computer more directly, and install a code 'fix'

The scheme involves seemingly official prompts – like the one pictured above – asking users to open what’s known as a ‘command-line shell,’ a form of software that allows more experienced coders to program their computer more directly, and install a code ‘fix’

‘This attack chain requires significant user interaction to be successful,’ the company noted in their advisory posting on the PowerShell-based cyber threat.

‘It also provides both the problem and a solution,’ they noted, ‘so that a viewer may take prompt action without pausing to consider the risk.’

Any person or prompt telling you to execute raw code into a terminal or shell should be treated with caution and extreme skepticism, they said. 

In all cases, these hackers have created their fake error messages via flaws or vulnerabilities inherent to using JavaScript in HTML email attachments or via wholly compromised websites online. 

While the overlaid fake Google Chrome, Microsoft Word, and OneDrive errors have been documented, Proofpoint investigators warned that this basic form of hack could pose as other trusted software update requests in the future.

In all cases, cybersecurity experts explained, the hackers created their fake error messages via flaws or vulnerabilities using JavaScript in HTML email attachments or via compromised websites. Above an example of the fake messages, disguised this time as an MS Word prompt

In all cases, cybersecurity experts explained, the hackers created their fake error messages via flaws or vulnerabilities using JavaScript in HTML email attachments or via compromised websites. Above an example of the fake messages, disguised this time as an MS Word prompt

While the overlaid fake Google Chrome, Microsoft Word, and OneDrive errors (example pictured above) have been documented now, Proofpoint investigators warned that this basic form of hack could pose as other trusted software update requests in the future

While the overlaid fake Google Chrome, Microsoft Word, and OneDrive errors (example pictured above) have been documented now, Proofpoint investigators warned that this basic form of hack could pose as other trusted software update requests in the future

Two interesting pieces of malicious software gave a clue as to the hackers’ intentions, according to Proofpoint.

One called ‘ma.exe’ downloaded and ran a crypto-currency mining program called XMRig with a specific configuration. The second, ‘cl.exe’ was cleverly designed to replace cryptocurrency addresses in the user’s ‘cut and paste’ clipboard. 

In essence, that second malware program was intended to accidentally cause unsuspecting victims to ‘transfer cryptocurrency to a threat actor-controlled address instead of the intended address when doing transfers,’ Proofpoint’s team said. 

If a user was copying and pasting a cryptocurrency wallet’s address for sending their digital money along, this malware would quietly swap that copied address for its own dummy wallet’s address. 

When the hack’s successful, the user fails to notice the switch and simply sends the cryptocurrency cash to the hacker’s anonymous dummy wallet.

In April, the security experts saw this new method in use alongside the ClearFake cluster of hacking tools, which targeted Apple users last November with what was described as a 'one hit smash-and-grab' virus. The new hacks appear to be primed to steal users' cryptocurrencies

In April, the security experts saw this new method in use alongside the ClearFake cluster of hacking tools, which targeted Apple users last November with what was described as a ‘one hit smash-and-grab’ virus. The new hacks appear to be primed to steal users’ cryptocurrencies 

In April, the security experts saw this new method in use alongside the ClearFake cluster of hacking tools, which targeted Apple users last November with what was described as a ‘one hit smash-and-grab’ virus.

The hacker’s malicious PowerShell script acts as a so-called Trojan that allows even more malicious code to be downloaded onto the victim’s system.

First it reportedly performs various diagnostics to confirm that the host device is a valid target. 

As a key test, one of the malicious PowerShell scripts would obtain system temperatures from the victim’s computer to detect if the malware was being running on a real computer, or a so-called ‘sandbox’ — a walled-off virtual PC used to handle and analyze potentially dangerous software. 

If no temperature data was returned to the malware, that fact was interpreted as a tell revealing that the hacker’s code was actually being run inside a virtual environment or sandbox. 

The malware would then exit and abort its operation, protecting the hackers’ later and more detailed malicious code from being caught in the sandbox for study by experts.

Proofpoint’s team advised users to be cautious about copying and pasting code or other text from prompts either on websites or alerts alleging to come from trusted software applications.

‘Antivirus software and EDRs [Endpoint Detection and Response monitoring software],’ they said, ‘have issues inspecting clipboard content.’

The cybersecurity firm also called on businesses to conduct training on this issue and to focus on ‘detection and blocking’ that would prevent these and similar ‘fake fix’ prompts from appearing in the first place.

Source link

Related Posts

NASA’s Artemis II makes triumphant return to Earth after ‘bullseye’ landing in the Pacific Ocean – bringing history-making Moon mission to an end
Science

NASA’s Artemis II makes triumphant return to Earth after ‘bullseye’ landing in the Pacific Ocean – bringing history-making Moon mission to an end

April 11, 2026
NASA warns there is ‘no plan B’ as Artemis II crew faces most dangerous phase of the Moon mission
Science

NASA warns there is ‘no plan B’ as Artemis II crew faces most dangerous phase of the Moon mission

April 8, 2026
I speak to dead people in the afterlife. They all share the same regrets about their time on Earth… but it’s not what you’d think
Science

I speak to dead people in the afterlife. They all share the same regrets about their time on Earth… but it’s not what you’d think

April 5, 2026
Next Post
Free Spider-Man 2 PS5 update might be the best yet – patch notes and new suits | Gaming | Entertainment

Free Spider-Man 2 PS5 update might be the best yet - patch notes and new suits | Gaming | Entertainment

Best garden sofa sets for all budgets and outdoor spaces

Best garden sofa sets for all budgets and outdoor spaces

Millionaires leave London in droves for Florida, Dubai and Paris

Millionaires leave London in droves for Florida, Dubai and Paris

Recommended

The bare cheek of it! Hundreds of nude cyclists descend upon Buckingham Palace for the 20th World Naked Bike Ride (with only a few wearing helmets)

The bare cheek of it! Hundreds of nude cyclists descend upon Buckingham Palace for the 20th World Naked Bike Ride (with only a few wearing helmets)

2 years ago
Bombshell new investigation into Pennsylvania’s Roswell as mystery of UFO crash deepens

Bombshell new investigation into Pennsylvania’s Roswell as mystery of UFO crash deepens

9 months ago
Mortgages ‘to rise’ after Pound hits year low and borrowing costs soar in treble blow to Rachel Reeves

Mortgages ‘to rise’ after Pound hits year low and borrowing costs soar in treble blow to Rachel Reeves

1 year ago
Pubs are closing at an alarming rate in Britain, but The Inspector reveals why this village inn with rooms – part of the Pig group – is proof ‘it’s not all doom and gloom’

Pubs are closing at an alarming rate in Britain, but The Inspector reveals why this village inn with rooms – part of the Pig group – is proof ‘it’s not all doom and gloom’

2 years ago

Categories

  • Business
  • Crypto
  • Entertainment
  • Food
  • Health
  • Home Improvment
  • Lifestyle
  • Motering/Cars
  • News
  • Opinion
  • Press Release
  • Real Estate
  • Science
  • Sports
  • Tech
  • Travel
  • World
No Result
View All Result

Highlights

Varicose veins left me in constant agony and killed my self-confidence. I finally found a life-changing, pain-free procedure that zapped them for good

Liverpool vs Fulham – Premier League LIVE: Rio Ngumoha, 17, curls in brilliant goal… before Mo Salah adds superb second

Disney Dreamlight Valley reduced to lowest price yet following Whispers of the Wind update | Gaming | Entertainment

Staggering 3000 mould and water faults reported in just TWO YEARS at Scotland’s scandal-hit £1billion superhospital

The ‘Amalfi Coast of Bulgaria’ – with €2 beers and meals for €10

THE MAKINGS OF A FASHION CAPITAL From Catalina Island to the shores of Orange County, a new generation of California designers is rewriting the luxury conversation.

London Mail

London Mail | Stay Informed, Stay Inspired ©2025, All rights Reserved

Navigate Site

  • Home
  • About
  • Advertise
  • Contact

Follow Us

No Result
View All Result
  • Home
  • Tech
  • News
  • Business
  • Science
  • Health
  • Sports
  • Lifestyle
  • Travel
  • Opinion

London Mail | Stay Informed, Stay Inspired ©2025, All rights Reserved