• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

Chrome extension Trojan tricks victims in an endless malware loop

3151

People in several Central and South American countries who wanted to watch a video online are affected by a Trojan that redirects the viewers to a new URL that contains malicious content.

These events were discovered by ESET research team when there was a spike in the JS/ChromeX.Submelius threats activity. This redirect happens when the victim presses to play a video. When it is clicked a new window appears demanding the victim to download a Chrome extension and it will not close until the victim relents and downloads the extension.

That first downloads opens a window for the hacker to take up permission to read or change all of the user’ s data on sites which was visited by the victim to inject malware into each site.

“ Then, while the user is browsing the internet, they will suddenly see new windows opening up with information about their system, taking them to other websites containing downloads of malicious code, advertising, or other kinds of content. This becomes an endless loop, which ultimately will benefit whoever is behind the fraudulent extension,” ESET wrote.

The cure for this is easy, finding the rogue extension and deleting it the Chrome extension are will help the victims to get out of this endless loop they are trapped in.

Tags:
andrew
Author: 

Comments ( 1 )

Thiago79178
Establish mechanisms for regular feedback from businesses on the effectiveness of collaborative programs and make necessary adjustments.
Add a comment

Frequently asked questions ( 5 )

Q

How do Trojans work?

A

Most trojans come in two parts, a Client, and a Server, but there are exceptions where the trojan does not need a Client, as it's able to automatically do what it was intended to do (stealing passwords, business data etc.), without any intervention from the attacker.

Q

What are the most common Trojans?

A

They are,
Remote Access Trojans (RAT's)
Password Sending Trojans
Keyloggers
Proxy/Wingate Trojans
DeDenial Of Service (DoS) Attack Trojans
FTP Trojans
structive
Software Detection Killers

Q

Is Trojan virus dangerous?

A

A Trojan can have one or multiple destructive uses—that is what makes them so dangerous. It's also important to realize that unlike viruses, Trojans are not self-replicating and are only spread by users who mistakenly download them, usually from an email attachment or by visiting an infected site.

Q

What is Trojan Horse attack?

A

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

Q

How does malware work?

A

Trojan horses masquerade as harmless programs, but when activated, they damage their host computer. Unlike a virus, a Trojan horse does not replicate itself; instead, this malware usually attempts to steal files or passwords. Computer worms replicate themselves to spread through a network.

Related Tutorials in Chrome extension Trojan tricks victims in an endless malware loop

Related Tutorials in Chrome extension Trojan tricks victims in an endless malware loop

How to install Chrome on Kali Linux
How to install Chrome on Kali Linux
Jul 11, 2017
How to Access google from Linux Terminal
How to Access google from Linux Terminal
Jul 16, 2016
How to install Google Chrome 63 on CentOS 7
How to install Google Chrome 63 on CentOS 7
Mar 22, 2018
How to install Google Chrome in Solus-3
How to install Google Chrome in Solus-3
Feb 26, 2018
How to install Chrome OS theme on Ubuntu
How to install Chrome OS theme on Ubuntu
May 19, 2017
How to Install or Upgrade Google Chrome 63 on Linux Mint 18.3
How to Install or Upgrade Google Chrome 63 on Linux Mint 18.3
Apr 10, 2018
How to Install Google Chrome Latest Version 73-0.3683.103 On Ubuntu 18.10
How to Install Google Chrome Latest Version 73-0.3683.103 On Ubuntu 18.10
May 17, 2019
How to Install Google Chrome in Debian
How to Install Google Chrome in Debian
Nov 15, 2016

Related Forums in Chrome extension Trojan tricks victims in an endless malware loop

Related Forums in Chrome extension Trojan tricks victims in an endless malware loop

google chrome
jacob class=
How to fix Chrome (--no-sandbox is not supported) error in centos
Oct 30, 2019
Linux
john class=
shortcut to open incognito browsing for chrome in linux
May 4, 2017
google chrome
sebastian class=
SSL Connection Error
Mar 1, 2021
google chrome
iqbal class=
Error 101 (net:: ERR_CONNECTION_RESET): The Connection was reset
Sep 29, 2021
Browser
stewart class=
How check extentions in Chrome
Nov 2, 2017
google chrome
Aditya class=
It seems There's an issue between your browser and WebGL
Nov 12, 2019

Related News in Chrome extension Trojan tricks victims in an endless malware loop

Related News in Chrome extension Trojan tricks victims in an endless malware loop

Uninstall Blacklisted Extensions With Google's Chrome Admin Policy
Uninstall Blacklisted Extensions With Google's Chrome Admin Policy
Apr 11, 2019
5 Best Secure and Private Web Browsers to Look Our For
5 Best Secure and Private Web Browsers to Look Our For
Nov 24, 2018
Chrome extension Trojan tricks victims in an endless malware loop
Chrome extension Trojan tricks victims in an endless malware loop
Apr 29, 2017
Google ditches Symantec over sloppy certs
Google ditches Symantec over sloppy certs
Mar 25, 2017
Dridex rears its ugly head again.
Dridex rears its ugly head again.
Apr 6, 2017
Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.
Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.
Jun 12, 2019
WordPress and Joomla websites infected by new backdoor malware
WordPress and Joomla websites infected by new backdoor malware
May 31, 2019
Google Patches 58 Android Vulnerabilities in February Security Update
Google Patches 58 Android Vulnerabilities in February Security Update
Feb 9, 2017
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Luke ?
workbench for debian

I am using workbench in CentOS whereas now I need to use Debian Operating system so could you please help to install and use in Debian?

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.