London Mail
  • Home
  • World
  • News
  • Opinion
  • Business
  • Tech
  • Science
  • Sports
  • Lifestyle
  • Health
  • Motering/Cars
  • More
    • Entertainment
    • Travel
    • Crypto
    • Food
    • Home Improvment
      • Real Estate
    • Press Release
No Result
View All Result
  • Home
  • World
  • News
  • Opinion
  • Business
  • Tech
  • Science
  • Sports
  • Lifestyle
  • Health
  • Motering/Cars
  • More
    • Entertainment
    • Travel
    • Crypto
    • Food
    • Home Improvment
      • Real Estate
    • Press Release
No Result
View All Result
London Mail
No Result
View All Result

Urgent warning to Google Chrome users after cyberattack targets browser with fake error messages – here’s how to protect yourself

by London Mail
June 18, 2024
in Science
Reading Time: 7 mins read

Security experts issued a warning to Google Chrome users after uncovering a cyberattack targeting the browser, as well as Microsoft‘s Word and OneDrive apps.

The attack has used fake error messages to trick users into installing the malicious software themselves as a ‘fix.’ 

Hackers are sending notifications through email as well as website pop-ups, which claim the user has experienced a software malfunction and need of a quick update.  

To spot a fake, experts have advised users to be wary of messages that claim a fix will require them to install a ‘root certificate’ by copying and pasting raw code.

While the cyberattack is capable of stealing all manner of private digital data, some of the new malware appears primed for stealing cryptocurrencies, like bitcoin.  

Hackers have a new tactic for sneaking malware onto your computer - fake updates to Google's Chrome browser, as well as Microsoft's Word and OneDrive products

Hackers have a new tactic for sneaking malware onto your computer – fake updates to Google’s Chrome browser, as well as Microsoft’s Word and OneDrive products

The malicious new hacking tactic was uncovered by the prolific cybersecurity firm Proofpoint, founded in 2002 by a former chief technology officer for Netscape. 

The new style of ‘fake error messages,’ they warned, ‘is clever and purports to be an authoritative notification coming from the operating system.’ 

The scheme involves seemingly official prompts from these tech giants, Google and Microsoft, asking users to open what’s known as a ‘command-line shell,’ specifically Microsoft’s version of a command-line tool for Windows, PowerShell.

Command line tools, including Windows PowerShell, are programs designed for more experienced coders to program their own computer’s core code directly. 

The hackers’ fake error messages encourage unwitting users to copy and paste raw code and then install it as a ‘fix’ by running or ‘executing’ that code in PowerShell.

Cyber security experts have only seen these hackers deploy this specific ‘fake fix’ scheme via PowerShell, so Apple iOS users should be able to rest easy for now.

The scheme involves seemingly official prompts - like the one pictured above - asking users to open what's known as a 'command-line shell,' a form of software that allows more experienced coders to program their computer more directly, and install a code 'fix'

The scheme involves seemingly official prompts – like the one pictured above – asking users to open what’s known as a ‘command-line shell,’ a form of software that allows more experienced coders to program their computer more directly, and install a code ‘fix’

‘This attack chain requires significant user interaction to be successful,’ the company noted in their advisory posting on the PowerShell-based cyber threat.

‘It also provides both the problem and a solution,’ they noted, ‘so that a viewer may take prompt action without pausing to consider the risk.’

Any person or prompt telling you to execute raw code into a terminal or shell should be treated with caution and extreme skepticism, they said. 

In all cases, these hackers have created their fake error messages via flaws or vulnerabilities inherent to using JavaScript in HTML email attachments or via wholly compromised websites online. 

While the overlaid fake Google Chrome, Microsoft Word, and OneDrive errors have been documented, Proofpoint investigators warned that this basic form of hack could pose as other trusted software update requests in the future.

In all cases, cybersecurity experts explained, the hackers created their fake error messages via flaws or vulnerabilities using JavaScript in HTML email attachments or via compromised websites. Above an example of the fake messages, disguised this time as an MS Word prompt

In all cases, cybersecurity experts explained, the hackers created their fake error messages via flaws or vulnerabilities using JavaScript in HTML email attachments or via compromised websites. Above an example of the fake messages, disguised this time as an MS Word prompt

While the overlaid fake Google Chrome, Microsoft Word, and OneDrive errors (example pictured above) have been documented now, Proofpoint investigators warned that this basic form of hack could pose as other trusted software update requests in the future

While the overlaid fake Google Chrome, Microsoft Word, and OneDrive errors (example pictured above) have been documented now, Proofpoint investigators warned that this basic form of hack could pose as other trusted software update requests in the future

Two interesting pieces of malicious software gave a clue as to the hackers’ intentions, according to Proofpoint.

One called ‘ma.exe’ downloaded and ran a crypto-currency mining program called XMRig with a specific configuration. The second, ‘cl.exe’ was cleverly designed to replace cryptocurrency addresses in the user’s ‘cut and paste’ clipboard. 

In essence, that second malware program was intended to accidentally cause unsuspecting victims to ‘transfer cryptocurrency to a threat actor-controlled address instead of the intended address when doing transfers,’ Proofpoint’s team said. 

If a user was copying and pasting a cryptocurrency wallet’s address for sending their digital money along, this malware would quietly swap that copied address for its own dummy wallet’s address. 

When the hack’s successful, the user fails to notice the switch and simply sends the cryptocurrency cash to the hacker’s anonymous dummy wallet.

In April, the security experts saw this new method in use alongside the ClearFake cluster of hacking tools, which targeted Apple users last November with what was described as a 'one hit smash-and-grab' virus. The new hacks appear to be primed to steal users' cryptocurrencies

In April, the security experts saw this new method in use alongside the ClearFake cluster of hacking tools, which targeted Apple users last November with what was described as a ‘one hit smash-and-grab’ virus. The new hacks appear to be primed to steal users’ cryptocurrencies 

In April, the security experts saw this new method in use alongside the ClearFake cluster of hacking tools, which targeted Apple users last November with what was described as a ‘one hit smash-and-grab’ virus.

The hacker’s malicious PowerShell script acts as a so-called Trojan that allows even more malicious code to be downloaded onto the victim’s system.

First it reportedly performs various diagnostics to confirm that the host device is a valid target. 

As a key test, one of the malicious PowerShell scripts would obtain system temperatures from the victim’s computer to detect if the malware was being running on a real computer, or a so-called ‘sandbox’ — a walled-off virtual PC used to handle and analyze potentially dangerous software. 

If no temperature data was returned to the malware, that fact was interpreted as a tell revealing that the hacker’s code was actually being run inside a virtual environment or sandbox. 

The malware would then exit and abort its operation, protecting the hackers’ later and more detailed malicious code from being caught in the sandbox for study by experts.

Proofpoint’s team advised users to be cautious about copying and pasting code or other text from prompts either on websites or alerts alleging to come from trusted software applications.

‘Antivirus software and EDRs [Endpoint Detection and Response monitoring software],’ they said, ‘have issues inspecting clipboard content.’

The cybersecurity firm also called on businesses to conduct training on this issue and to focus on ‘detection and blocking’ that would prevent these and similar ‘fake fix’ prompts from appearing in the first place.

Source link

Related Posts

Family of missing US scientist make very inflammatory claim about what REALLY happened in ‘highly suspicious’ disappearance: ‘We’re scared for our safety’
Science

Family of missing US scientist make very inflammatory claim about what REALLY happened in ‘highly suspicious’ disappearance: ‘We’re scared for our safety’

May 2, 2026
Ex-CIA psychic spy claims humans can tap into ‘infinite consciousness’… and reveals how to unlock it
Science

Ex-CIA psychic spy claims humans can tap into ‘infinite consciousness’… and reveals how to unlock it

April 26, 2026
Biblical discovery in Egypt as statue linked to story of Moses is pulled from the Nile
Science

Biblical discovery in Egypt as statue linked to story of Moses is pulled from the Nile

April 23, 2026
Next Post
Free Spider-Man 2 PS5 update might be the best yet – patch notes and new suits | Gaming | Entertainment

Free Spider-Man 2 PS5 update might be the best yet - patch notes and new suits | Gaming | Entertainment

Best garden sofa sets for all budgets and outdoor spaces

Best garden sofa sets for all budgets and outdoor spaces

Millionaires leave London in droves for Florida, Dubai and Paris

Millionaires leave London in droves for Florida, Dubai and Paris

Recommended

Dead dolphin bleeding from its eye and jaw that washed up on New Jersey beach sparks investigation – as locals claim sonar blasting from  offshore wind farm companies is to blame

Dead dolphin bleeding from its eye and jaw that washed up on New Jersey beach sparks investigation – as locals claim sonar blasting from  offshore wind farm companies is to blame

2 years ago
See inside the ‘hurricane-proof’ mansion built by an insurance exec who spent $25k on front door alone

See inside the ‘hurricane-proof’ mansion built by an insurance exec who spent $25k on front door alone

2 years ago
Sasha Rodoy and Nicola Dowling: Fearmongering, Islamophobia, and the Targeting of the UK’s Eye Surgery Giants

Sasha Rodoy and Nicola Dowling: Fearmongering, Islamophobia, and the Targeting of the UK’s Eye Surgery Giants

2 years ago
The best Black Friday holiday, flights and package deals you don’t want to miss

The best Black Friday holiday, flights and package deals you don’t want to miss

5 months ago

Categories

  • Business
  • Crypto
  • Entertainment
  • Food
  • Health
  • Home Improvment
  • Lifestyle
  • Motering/Cars
  • News
  • Opinion
  • Press Release
  • Real Estate
  • Science
  • Sports
  • Tech
  • Travel
  • World
No Result
View All Result

Highlights

Arsenal vs Fulham – Premier League LIVE: Latest score and updates as Gunners cruise to vital victory in title race

Best Emma mattresses review UK 2026: Hybrid models compared

Devil Wears Prada star explains Nate’s absence from sequel | Films | Entertainment

Avocado toast is tastier if you take two minutes to prepare it with an everyday ingredient

Revealed: It was the NSPCC that first introduced Andrew Mountbatten-Windsor to Peter Mandelson – as charity’s fundraising director admits he regrets it now

Jaw dropping townhouse in Edinburgh hits the market for over £1.6 million

London Mail

London Mail | Stay Informed, Stay Inspired ©2025, All rights Reserved

Navigate Site

  • Home
  • About
  • Advertise
  • Contact

Follow Us

No Result
View All Result
  • Home
  • Tech
  • News
  • Business
  • Science
  • Health
  • Sports
  • Lifestyle
  • Travel
  • Opinion

London Mail | Stay Informed, Stay Inspired ©2025, All rights Reserved