Chrome Security Alert - Clicking on this error will open the malware floodgates on your PC

Chrome Security Alert - Clicking on this error will open the malware floodgates on your PC

Hackers love to trick victims and do what they don't do otherwise, and the new malware campaign that is currently doing rounds online is a perfect example of this.

As reported by BleepingComputer, hackers are using fake Google Chrome and Microsoft Word errors to trick potential victims into running malicious PowerShell "fixes" that actually install malware.

This particular campaign has been very effective and has been used in attacks by multiple hacker groups (including the one behind ClearFake, a new group called ClickFix, and the TA571 group). 

Here's all you need to know about this new malware campaign, and how you can avoid it falling victim to the social engineering you use to infect your Windows PC with malware.

Similar to the previous ClearFake campaign, this new campaign uses overlays to display fake Chrome and Word errors. Potential victims will be asked to click the copy button containing "fix" for these fake errors. You must paste this copied code into the Windows Run dialog or Powershell prompt.

In a new report highlighting all the different attack chains used in the campaign, Proofpoint said that compromised websites that use Binance's smart chain contract to load malicious scripts hosted on the blockchain could also infect vulnerable Windows PCs with malware. It is also used to make it easier for the user to use the app.

This script performs some checks before displaying a fake Google Chrome warning that the web page in question is having a problem viewing. From here, you will be prompted to install the "Root Certificate" by copying the PowerShell script and running it in the Windows PowerShell (Administrator) console.

Running this PowerShell script will perform more checks to ensure that the device in question is a valid target before downloading additional payloads containing information-stealing malware.

Finally, there is also an email-based infection chain that uses HTML attachments similar to Word documents. They urge potential victims to install the "Word Online" extension to view documents, but like the other attack chains used in this campaign, "fixes" containing PowerShell commands must also be copied and pasted into PowerShell.

In this attack chain, PowerShell commands download and run either Msi files or Vbs scripts to infect the target PC with either Matanbuchus or DarkGate malware.

The 3 different attack chains used in this campaign all rely on the fact that most Windows users are not aware of the dangers associated with running unknown PowerShell commands on their PCs. This is why you should not copy and run your code unless you absolutely know what you are doing.

Similarly, you should make sure that Windows Defender is enabled and running on your PC so that you can catch malware dropped by these malicious PowerShell scripts. If you want even more protection, however, do not worry about things before doing something online, especially with Microsoft's built-in

campaigns that use overlays to trick potential victims, especially as they often come with extra things like VPNs and password managers. I would like to stop to think and take a minute. Hackers often try to instill a sense of urgency in their attacks to act without you thinking. Instead, try to read the messages carefully and examine them online to see if they are genuine. Even if you don't find any information online, in most cases, doing nothing is the best course of action.

Overlay attacks are very effective because they often appear as if they are coming from the software you are currently using. But by learning how they work and knowing what to watch out for, you can keep your devices and data safe.

Categories