Hackers Abuse Google Alerts to Promote a Fake Adobe Flash Player Update that Installs Malware

Google Alerts is a content change detection and notification service, offered by the search engine company Google. The service sends emails to the user when it finds new results, such as web pages, newspaper articles, blogs, or scientific research, that match the user’s search term.

Threat actors are using Google Alerts to promote a fake Adobe Flash Player updater that installs other unwanted programs on unsuspecting users’ computers.

The bad actors create fake stories with titles containing popular keywords that Google Search then indexes. Once indexed, Google Alerts will alert people who are following those keywords.

Upon clicking the fake stories using a Google redirect link, the visitor will be redirected to the threat actor’s malicious site (as shown below).

Example Google Alerts link for a fake story

After clicking the fake story’s URL directly, the website will state that the page does not exist.

Page does not exist when directly visiting the URL

Experts also observed fake stories being indexed by Google and pushed out by Google Alerts. These have been redirecting users to web pages pushing browser notification spam, unwanted extensions, or fake giveaways.

An Alleged Flash Updater is Offered

The most recent scam that states your Flash Player is outdated and then prompts you to install an updater.

Website stating Flash Player needs to be updated

Once Clicked the ‘Update’ button, the victim will download a setup.msi file that installs a potentially unwanted program called ‘One Updater.’ Even if “One Updater” is not malware, similar software in the past has installed password-stealing Trojans and cryptocurrency miners.

Experts state that if you are redirected to a website, through Google Alerts, Google Search, or any other means and are prompted to install an extension or program update, simply close the browser.

Installing these programs naturally leads to malicious activity or unwanted behavior that only benefits the application developers.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Also Read

Google Published a Research Blog About who are the People Prone to cyber-attacks via Email

Apple New Proxy Feature to Prevent Leaking IP Addresses to Google

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…

22 hours ago

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…

1 day ago

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…

1 day ago

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…

2 days ago

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

The watering hole attack leverages a compromised website to deliver malware. When a user visits…

2 days ago

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and…

2 days ago