Hackers sneak malware in your browser using the Google link, and antivirus software can’t stop
- Advertisement -
- Advertisement -
- Attackers use real Google -Urls to sneak malware past antivirus and unnoticed in your browser
- This malware is only activated during checkout, making it a silent threat to online payments
- The script opens a web socket connection connection, fully invisible for the average user
A new browser-based malware Campaign has surfaced and shows how attackers now operate familiar domains such as Google.com to bypass traditional antivirus ponds.
A report From security researchers to C/Side, this method is subtle, conditionally activated and difficult for both users and conventional security software to detect.
It seems to come from a legitimate Oauth-related URL, but secretly performs a malignant charge with full access to the user’s browser session.
Malware hidden in sight
The attack starts with a script embedded in a compromised Magento-based e -commerce Site that refers to an apparently imperative Google OUKTRE URL: https://accounts.google.com/o/oauth2/revoke.
However, this URL contains a manipulated callback parameter, which decodes and performs a darkened JavaScript -Payload with the help of Eval (…)).
The use of Google’s domain is central to the deception – because the script loads from a trusted source, allow the most content security policy (CSPs) and DNS filters without a doubt.
This script is only activated under specific conditions. If the browser appears automated whether the URL contains the word ‘payment’, it quietly opens a web socket connection with a malignant server. This means that malignant behavior can adjust to user actions.
Every load sent via this channel is basic 64-coded, decoded and dynamically executed using the JavaScript function structure.
The attacker can remotely perform code in the browser in real time with this setup.
One of the most important factors that influence the effectiveness of this attack is the ability to do much of the Best antivirus programs Currently on the market.
The logic of the script is heavily obscured and is only activated under certain circumstances, making it unlikely that even the Best Android Antivirus apps and static malware scanners.
They will not inspect JavaScript -Payloads that are supplied by apparently legitimate Oauth streams, flags or blocks.
DNS-based filters or firewall rules also offer limited protection, because the first request on Google’s legitimate domain is.
In the Enterprise environment, even part of the Best end point protection Tools may have difficulty detecting this activity if they are highly dependent on domain reputation or not inspecting to inspect dynamic script version within browsers.
Although advanced users and cyber security teams can use proxies or behavioral analysis tools to identify anomalies such as these, average users are still vulnerable.
Restriction of third -party scripts, the separation of browser sessions used for financial transactions and remain vigilant about unexpected Site behavior can all help to reduce the risk in the short term.
Maybe you like it too
- Advertisement -