New Malware Spreads Through Hacked Sites as Fake Browser Update

New Malware Spreads Through Hacked Sites as Fake Browser Update

Most malware attacks rely on fooling users into launching a corrupted executable file, and online criminals have come up with plenty of ways to do that. There’s a new piece of malware making the rounds online via hacked websites that uses sophisticated redirects and modified JavaScript to load a malicious payload on your computer. According to Malwarebytes, there are probably thousands of affected sites.

The attack most likely began late last year, and some site operators began noticing something was afoot in February. Sites using WordPress, SquareSpace, and Joomla content management systems have been targeted by the group behind this so-called “FakeUpdates campaign.” The attackers either modify or replace JavaScript files on the site in order to target visitors.

When you visit one of these infected sites, you’ll get a fake update notification (hence the name) that kicks off the infection. You might wonder how this attack could pop up on thousands of websites for months without detection until recently. This is a clever attack that uses a light touch with a site’s visitors. For one, it only serves the fake update notification once per IP address. The update notification (which is a redirected URL) is themed to match your browser. So Firefox users get a page about running an old version of Firefox, and it’s the same for Chrome users. There’s a version for Flash updates, too. The styling of these pages looks spot-on.

New Malware Spreads Through Hacked Sites as Fake Browser Update

If you do fall for the fake update, you don’t get an executable. Instead, a malicious JavaScript file is served up from Dropbox. The Dropbox URL frequently changes to avoid detection and blocking. The script analyzes the victim’s system and gives the attacker flexibility in delivering the actual payload. If a system isn’t attractive enough, the script can shut down without installing malware.

The end result of an infection with the FakeUpdates campaign is that your system runs the Chtonic banking malware, which is a variant of ZeusVM. That gives the attacker full control of a system including file transfer and remote access.

Now that the cat’s out of the bag, site operators and CMS systems can begin purging FakeUpdates from websites. It won’t go away overnight, and it might just mutate to avoid detection and come back later. Your best bet is never to trust popups that tell you to download something, even if they look legit. Only download on your own terms.

Continue reading

IBM Plans to Reassign 31,000 Workers, Will Cut 10,000 Positions in 2018

IBM is firing over 10,000 workers and reassigning 30,000 more as part of yet another round of downsizing and reassignment.

NASA Finds Vast Deposits of Ice Just Under Martian Surface

We've known for years that there is at least some water ice on Mars, but it's been hard to pin down where it is and how easy it would be to extract. New data from NASA's Mars Reconnaissance Orbiter indicates it could be almost everywhere.

OnePlus Says 40,000 Credit Card Numbers Were Stolen From Its Site

It turns out a malicious script has been hiding on its website for about two months.

Microsoft May Be Mulling a Major Studio Acquisition, Possibly Even EA

Microsoft has a problem with console exclusives and it's thinking about picking up a studio or two to help out — including, believe it or not, EA.