Saturday, March 1, 2025
Homecyber securityGoogle Chrome Warns of Malicious Files While Downloading

Google Chrome Warns of Malicious Files While Downloading

Published on

SIEM as a Service

Follow Us on Google News

Google Chrome has introduced a revamped download experience with comprehensive warnings about potentially malicious files.

This update is part of Chrome’s ongoing effort to keep users secure while interacting with downloaded content.

Last year, Google Chrome unveiled a redesigned downloads interface on desktops, designed to make it easier for users to manage their recent downloads. This new interface offers a more flexible and spacious UI and provides a platform for enhanced security features.

The redesign allows Chrome to deliver more detailed and nuanced warning messages, helping users make informed decisions about their downloads.

Adding Context and Consistency to Download Warnings

According to the Google blog reports, With the additional space in the new downloads UI, Chrome has replaced its previous warning messages with more detailed ones.

These messages now offer better context about the nature of the threat, enabling users to understand the risks more clearly.

Our legacy, space-constrained warning vs. our redesigned one. The warnings are part of a two-tier system based on AI-powered malware verdicts from Google Safe Browsing:

  • Suspicious Files: These carry a lower confidence verdict and an unknown risk of user harm.
  • Dangerous Files: These have a high confidence verdict and a high risk of user harm.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

The two types of warnings are differentiated by iconography, color, and text, making it easier for users to quickly assess the threat level and decide on the appropriate action.

Differentiation between suspicious and dangerous warnings

Protecting More Downloads with Automatic Deep Scans

For users who have opted into the Enhanced Protection mode of Safe Browsing in Chrome, there is an additional layer of security.

These users are prompted to send the contents of suspicious files to Safe Browsing for deep scanning before opening the file.

This process has proven highly effective, catching new malware and dangerous files that Safe Browsing has not previously encountered. Files sent for deep scanning are over 50 times more likely to be flagged as malware than the average download.

An automatic deep scan resulting in a warning

To streamline this process and reduce user friction, Chrome performs automatic deep scans for Enhanced Protection users rather than prompting each time.

Staying Ahead of Attackers Who Hide in Encrypted Archives

A current trend among attackers is distributing malware in encrypted archives, such as .zip, .7z, or .rar files, which are protected by passwords. This method hides the file contents from Safe Browsing and other antivirus detection scans.

Enter a file password to send an encrypted file for a malware scan

To counter this, Chrome has introduced two protection mechanisms based on the user’s Safe Browsing mode:

  • Enhanced Protection Mode: Users are prompted to enter the file’s password and send it along with the file to Safe Browsing for a deep scan. The uploaded files and passwords are deleted shortly after scanning.
  • Standard Protection Mode: Users are still prompted to enter the file’s password, but in this case, both the file and the password remain on the local device. Safe Browsing checks only the metadata of the archive contents.

Collaborating for Better Security

The Chrome Security team collaborates closely with Google Safe Browsing, Google’s Threat Analysis Group, and security researchers worldwide.

This collaboration helps Chrome stay ahead of attackers by continuously adapting its product strategy based on the latest insights into attack techniques.

Google Chrome’s new download warnings and enhanced security measures represent a significant step in protecting users from malicious files.

By providing more detailed warnings and leveraging AI-powered malware detection, Chrome is helping users make safer choices and stay protected online.

As attackers continue to evolve their methods, Chrome remains committed to enhancing its security features and keeping users safe.  By incorporating these advanced security measures, Google Chrome sets a new standard for user safety in the digital age.

Stay tuned for more updates as Chrome continues to innovate and improve its security protocols.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...