New Malware Spreads Through Hacked Sites as Fake Browser Update

New Malware Spreads Through Hacked Sites as Fake Browser Update

Most malware attacks rely on fooling users into launching a corrupted executable file, and online criminals have come up with plenty of ways to do that. There’s a new piece of malware making the rounds online via hacked websites that uses sophisticated redirects and modified JavaScript to load a malicious payload on your computer. According to Malwarebytes, there are probably thousands of affected sites.

The attack most likely began late last year, and some site operators began noticing something was afoot in February. Sites using WordPress, SquareSpace, and Joomla content management systems have been targeted by the group behind this so-called “FakeUpdates campaign.” The attackers either modify or replace JavaScript files on the site in order to target visitors.

When you visit one of these infected sites, you’ll get a fake update notification (hence the name) that kicks off the infection. You might wonder how this attack could pop up on thousands of websites for months without detection until recently. This is a clever attack that uses a light touch with a site’s visitors. For one, it only serves the fake update notification once per IP address. The update notification (which is a redirected URL) is themed to match your browser. So Firefox users get a page about running an old version of Firefox, and it’s the same for Chrome users. There’s a version for Flash updates, too. The styling of these pages looks spot-on.

New Malware Spreads Through Hacked Sites as Fake Browser Update

If you do fall for the fake update, you don’t get an executable. Instead, a malicious JavaScript file is served up from Dropbox. The Dropbox URL frequently changes to avoid detection and blocking. The script analyzes the victim’s system and gives the attacker flexibility in delivering the actual payload. If a system isn’t attractive enough, the script can shut down without installing malware.

The end result of an infection with the FakeUpdates campaign is that your system runs the Chtonic banking malware, which is a variant of ZeusVM. That gives the attacker full control of a system including file transfer and remote access.

Now that the cat’s out of the bag, site operators and CMS systems can begin purging FakeUpdates from websites. It won’t go away overnight, and it might just mutate to avoid detection and come back later. Your best bet is never to trust popups that tell you to download something, even if they look legit. Only download on your own terms.

Continue reading

Google Pixel Slate Owners Report Failing Flash Storage
Google Pixel Slate Owners Report Failing Flash Storage

Google's product support forums are flooded with angry Pixel Slate owners who say their devices are running into frequent, crippling storage errors.

Astronomers Might Finally Know the Source of Fast Radio Bursts
Astronomers Might Finally Know the Source of Fast Radio Bursts

A trio of new studies report on an FRB within our own galaxy. Because this one was so much closer than past signals, scientists were able to track it to a particular type of neutron star known as a magnetar.

How to Build a Face Mask Detector With a Jetson Nano 2GB and AlwaysAI
How to Build a Face Mask Detector With a Jetson Nano 2GB and AlwaysAI

Nvidia continues to make AI at the edge more affordable and easier to deploy. So instead of simply running through the benchmarks to review the new Jetson Nano 2GB, I decided to tackle the DIY project of building my own face mask detector.

Apple’s New M1 SoC Looks Great, Is Not Faster Than 98 Percent of PC Laptops
Apple’s New M1 SoC Looks Great, Is Not Faster Than 98 Percent of PC Laptops

Apple's new M1 silicon really looks amazing, but it isn't faster than 98 percent of the PCs sold last year, despite what the company claims.