AMP AMP

Chrome extension Trojan tricks victims in an endless malware loop

People in several Central and South American countries who wanted to watch a video online are affected by a Trojan that redirects the viewers to a new URL that contains malicious content.

These events were discovered by ESET research team when there was a spike in the JS/ChromeX.Submelius threats activity. This redirect happens when the victim presses to play a video. When it is clicked a new window appears demanding the victim to download a Chrome extension and it will not close until the victim relents and downloads the extension.

That first downloads opens a window for the hacker to take up permission to read or change all of the user’ s data on sites which was visited by the victim to inject malware into each site.

“ Then, while the user is browsing the internet, they will suddenly see new windows opening up with information about their system, taking them to other websites containing downloads of malicious code, advertising, or other kinds of content. This becomes an endless loop, which ultimately will benefit whoever is behind the fraudulent extension,” ESET wrote.

The cure for this is easy, finding the rogue extension and deleting it the Chrome extension are will help the victims to get out of this endless loop they are trapped in.

Comment
Thiago79178
Nov 04 2024
Establish mechanisms for regular feedback from businesses on the effectiveness of collaborative programs and make necessary adjustments.
Add a comment
FAQ
Q
How does malware work?
A
Trojan horses masquerade as harmless programs, but when activated, they damage their host computer. Unlike a virus, a Trojan horse does not replicate itself; instead, this malware usually attempts to steal files or passwords. Computer worms replicate themselves to spread through a network.
Q
What is Trojan Horse attack?
A
A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
Q
Is Trojan virus dangerous?
A
A Trojan can have one or multiple destructive uses—that is what makes them so dangerous. It's also important to realize that unlike viruses, Trojans are not self-replicating and are only spread by users who mistakenly download them, usually from an email attachment or by visiting an infected site.
Q
What are the most common Trojans?
A
They are,
Remote Access Trojans (RAT's)
Password Sending Trojans
Keyloggers
Proxy/Wingate Trojans
DeDenial Of Service (DoS) Attack Trojans
FTP Trojans
structive
Software Detection Killers
Q
How do Trojans work?
A
Most trojans come in two parts, a Client, and a Server, but there are exceptions where the trojan does not need a Client, as it's able to automatically do what it was intended to do (stealing passwords, business data etc.), without any intervention from the attacker.