Wednesday, April 2, 2025
HomeCyber Security NewsAdrozek Malware Silently Hijacks Microsoft Edge, Google Chrome, Yandex, and Firefox Browsers

Adrozek Malware Silently Hijacks Microsoft Edge, Google Chrome, Yandex, and Firefox Browsers

Published on

SIEM as a Service

Follow Us on Google News

Google Chrome, Firefox, Microsoft Edge, and Yandex have become the most recent targets of an ongoing malware campaign, called Adrozek, as disclosed by Microsoft.

The malware injects ads into search results and adds malicious browser extensions. The threat being noticed on above 30,000 devices each day.

How do Adrozek Malware works?

The main goal for Adrozek is to lead people to affiliated pages. The malware silently adds malicious browser extensions and changes browser settings to insert ads into webpages, often on top of legitimate ads from search engines. It also modifies the Dynamic Link Library (DLL) files per target browser, MsEdge.dll on Microsoft Edge, for instance, to turn off security controls.

The intended effect is for users, searching for certain keywords, to unintentionally click on these malware-inserted ads, which lead to affiliated pages. The attackers earn through affiliate advertising programs, which pay by the amount of traffic referred to sponsored affiliated pages.

Comparison of search results pages on an affected machine and one with Adrozek running

Distribution Infrastructure

Microsoft stated that from May to September, it recorded hundreds of thousands of encounters of the Adrozek malware globally. The company tracked 159 unique domains, each hosting an average of 17,300 unique URLs, which, in turn, host an average of over 15,300 distinct, polymorphic malware samples.

Microsoft expects the Adrozek operation to raise even more in the coming months.

Adrozek attack chain

Modifying browser components

Extensions

Adrozek makes changes to certain browser extensions. The Microsoft team noted this specifically on Google Chrome. It typically modifies the default “Chrome Media Router” extension. Similarly, on Microsoft Edge and Yandex Browser, it uses IDs of legitimate extensions, such as “Radioplayer”.

Browser DLLs

The malware also tampers with certain browser DLLs. For instance, on Microsoft Edge, it modifies MsEdge.dll to turn off security controls that are crucial for detecting any changes in the Secure Preferences file.

Browser security settings

Browsers have security settings that defend against malware tampering. The Preferences file, for example, contains sensitive data and security settings. Chromium-based browsers detect any unauthorized modifications to these settings through signatures and validation on several preferences.

Browser updates

To prevent the browsers from being updated with the latest versions, which could restore modified settings and components, Adrozek adds a policy to turn off updates.

Persistence

Adrozek changes several systems settings to have even more control of the compromised device. The ‘tag’ and ‘did’ entries contain the command-line arguments are used to launch the main payload. To maintain persistence, the malware creates a service named “Main Service”.

Ad injection

The injection of ads is performed by malicious scripts downloaded from remote servers. Depending on the search keyword, scripts add related ads at the top of legitimate ads and search results.

Credential theft

On Mozilla Firefox, malware downloads an additional randomly named .exe file, which steals device information and the currently active username and sends this information to the attacker.

Conclusion

Microsoft Defender Antivirus, the built-in endpoint protection solution on Windows 10, uses behaviour-based, machine learning-powered detections to block Adrozek. End users who find this threat on their devices are advised to re-install their browsers.

Configuring security software to automatically download and install updates, as well as running the latest versions of the operating system and applications and deploying the latest security updates help harden endpoints from threats.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Massive Spying Campaign Targets Chrome Browser, Over 32 Million Users Potentially Impacted

Behave – A New Browser Extension to Find websites that Perform Browser-Based Port Scans or Attack

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Firefox 137 Launches with Patches for High-Severity Security Flaws

Mozilla has officially launched Firefox 137 with crucial security fixes aimed at addressing several...

Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers

A privilege escalation vulnerability in Google Cloud Platform (GCP), dubbed "ImageRunner," was recently discovered...

Apple Fined $162 Million by France Authorities for Mobile Ad Market Domination

French antitrust regulators have imposed a hefty fine of €150 million ($162.4 million) on...

20,000 WordPress Sites at Risk of File Upload & Deletion Exploits

A critical security alert has been issued to WordPress site administrators following the discovery...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Firefox 137 Launches with Patches for High-Severity Security Flaws

Mozilla has officially launched Firefox 137 with crucial security fixes aimed at addressing several...

Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers

A privilege escalation vulnerability in Google Cloud Platform (GCP), dubbed "ImageRunner," was recently discovered...

Apple Fined $162 Million by France Authorities for Mobile Ad Market Domination

French antitrust regulators have imposed a hefty fine of €150 million ($162.4 million) on...