Wednesday, December 6, 2023

Hackers Abuse Google Alerts to Promote a Fake Adobe Flash Player Update that Installs Malware

Google Alerts is a content change detection and notification service, offered by the search engine company Google. The service sends emails to the user when it finds new results, such as web pages, newspaper articles, blogs, or scientific research, that match the user’s search term.

Threat actors are using Google Alerts to promote a fake Adobe Flash Player updater that installs other unwanted programs on unsuspecting users’ computers.

The bad actors create fake stories with titles containing popular keywords that Google Search then indexes. Once indexed, Google Alerts will alert people who are following those keywords.

Upon clicking the fake stories using a Google redirect link, the visitor will be redirected to the threat actor’s malicious site (as shown below).

Example Google Alerts link for a fake story

After clicking the fake story’s URL directly, the website will state that the page does not exist.

Page does not exist when directly visiting the URL

Experts also observed fake stories being indexed by Google and pushed out by Google Alerts. These have been redirecting users to web pages pushing browser notification spam, unwanted extensions, or fake giveaways.

An Alleged Flash Updater is Offered

The most recent scam that states your Flash Player is outdated and then prompts you to install an updater.

Website stating Flash Player needs to be updated

Once Clicked the ‘Update’ button, the victim will download a setup.msi file that installs a potentially unwanted program called ‘One Updater.’ Even if “One Updater” is not malware, similar software in the past has installed password-stealing Trojans and cryptocurrency miners.

Experts state that if you are redirected to a website, through Google Alerts, Google Search, or any other means and are prompted to install an extension or program update, simply close the browser.

Installing these programs naturally leads to malicious activity or unwanted behavior that only benefits the application developers.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Also Read

Google Published a Research Blog About who are the People Prone to cyber-attacks via Email

Apple New Proxy Feature to Prevent Leaking IP Addresses to Google


Latest articles

BlueNoroff: New Malware Attacking MacOS Users

Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT...

Serpent Stealer Acquires Browser Passwords and Erases Intrusion Logs

Beneath the surface of the cyber realm, a silent menace emerges—crafted with the precision...

Doppelgänger: Hackers Employ AI to Launch Highly sophistication Attacks

It has been observed that threat actors are using AI technology to conduct illicit...

Kali Linux 2023.4 Released – What’s New!

Kali Linux 2023.4, the latest version of Offensive Security's renowned operating system, has been...

Trickbot Malware Developer Pleads Guilty & Faces 35 Years in Prison

A 40-year-old Russian national, Vladimir Dunaev, pleaded guilty for developing and deploying Trickbot malware....

ICANN Launches RDRS to Assist Law Enforcement Agencies to Discover Private Info

ICANN is a non-profit organization that is responsible for coordinating the global internet's-DNSIP address...

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles