A new malware endangers the data of millions of users. Some researchers, experts in cybersecurity, have discovered a new phishing attempt on Chrome that strikes by prompting victims to download a missing font to the Google browser.
Once downloaded, the cybercriminals install malicious software instead that allows hackers to get their hands on users' personal data. As happened before, the system is so sophisticated that it almost faithfully replicates Chrome windows. This, unfortunately, increases the risk of a careless user falling into the cunning hacker trap. To come across this new malware - whose origin still remains shrouded in mystery - were the experts of NeoSmart Technologies, a specialized company in cyber security solutions. The virus was found on an already compromised WordPress site.
How Malware Affects
The new hacking attempt, as anticipated, brings up a pop-up asking users to "repair" the browser by adding a missing font. The web page appears to have some text problems indeed. At this point, if the distracted user clicks on the blue button, a file is downloaded to the PC which, as normally happens, is deposited on the lower part of the screen. The victim has not yet been infected, as the malicious program needs to be installed on the pc to hit. However, if the user decides to follow the instructions of the virus and continues with the installation, the malware enters the system and at this point the hackers are done.
Difficult to spot
As mentioned, the message at first glance seems to be reliable: background and colors are almost identical to those of Big G. On the pop-up there is even the Chrome logo. To make matters worse, it is also the difficulty for antivirus software to find malware. According to the researchers, the malicious file was only rated as malicious by 9 out of 59 software. Although the danger of the virus is not yet known, it is good to be especially careful.
What to do to protect yourself
What to do to protect yourself? The first trick to put into practice is to try to avoid clicking on windows, apparently reliable, which ask us to download files. Also remember that it is very important to keep your browsers up to date and to have a good antivirus.
How to defend against hacker attacks
By clicking on the following links, however, you can discover tips, some more technical others more within everyone's reach, regarding computer security and discover the most common types of attacks: from DDoS attacks to phishing, passing through botnets.
- Protect privacy and personal data, expert advice
- Six tips for securing your small or medium business
- Ten tips to avoid falling into the trap of a phishing email
- How to protect your email with Secure Password: what it is and how it works
- Saving yourself from hackers: 5 mistakes you shouldn't make
- Virus, trojan and ransomware alert, the guide to defend yourself
- What are ransomware and how does it spread?
- Ransomware danger: how to defend yourself with good practices and antivirus
- Ransomware dilemma: can the “ransom virus” be stopped?
- Ransomware attack: small and medium-sized businesses in danger
- What are DDoS attacks, how they arise and how to defend themselves
- What is phishing? A dangerous scam: here's how not to take the bait
- Online privacy: here's how to safeguard our personal data
- How to create a strong password to protect your online identity
- Say goodbye to password theft, here's two-step verification
- The best password managers to secure your data