Analysts at Dr. Web, a Russian anti-virus company, have uncovered a campaign that has tricked victims into downloading malware disguised as a Google Chrome update. Using multiple compromised WordPress sites, the threat actor embedded a JavaScript redirection script, sending visitors to a legitimate-looking Google Chrome update page. If the visitor is tricked into installing the malware, a remote connection using TeamViewer is established, giving the attackers full control over the victim’s computer. Dr. Web analysts have seen other malware, including password stealers, installed after the initial infection. Dr. Web claimed that the threat actors behind this attack have compromised many WordPress-powered sites and were previously involved in spreading malware through fake VSDC video editor and fake NordVPN installers. Victims have included people in the United States, Canada, Israel, Australia, Turkey and the United Kingdom.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security