Hackers are using fake Chrome updates to spread malware — don’t fall for this

and image of the Google Chrome logo on a laptop
(Image credit: Shutterstock)

Hackers are once again using fake Google Chrome updates as means to infect unsuspecting users with malware.

This time around though, they’re first going after websites and injecting scripts into them that display fake Chrome automatic update errors according to BleepingComputer.

The campaign itself began back in November of last year but in a new report, NTT security analyst Rintaro Koike explains that the hackers responsible expanded its scope in February 2023 to target even more users.

During its investigation into the matter, BleepingComputer discovered numerous sites that have been hacked in this malware distribution campaign which include news sites, online stores, blogs and adult sites as well.

Tricking visitors with fake Chrome updates

Woman using smartphone and laptop

(Image credit: Shutterstock)

Once a website has been compromised by injecting malicious JavaScript code into it, the now hacked site executes scripts capable of downloading additional scripts when a user visits the site. 

The hackers behind this campaign are using the Pinana IPFS (InterPlanetary File System) service to deliver these additional scripts as it hides the origin of the server hosting the files which makes blocking them difficult.

If a targeted user does visit one of these hacked sites, the scripts display a fake Google Chrome error screen that says they need to install an automatic update to continue to the site. From here, the scripts automatically download a ZIP file named “release.zip” which is disguised as a Chrome update.

Unsuspecting users that fall for this trick end up installing a Monero miner on their PC instead of a legitimate Chrome update. The danger with having a crypto miner like this one installed on your computer is that your system will run slower since it’s actually doing quite a lot of work in the background. At the same time though, it could also put additional stress on your CPU, GPU and other components which would then need to be replaced sooner rather than later.

Another interesting thing about this malware campaign is that the crypto miner it installs establishes persistence on a victim’s PC by adding scheduled tasks and performing Registry modifications. It also excludes itself from Windows Defender and as a result, Microsoft’s antivirus software won’t know to remove it from your system.

To make matters worse, the malware even stops Windows Update which could make your PC vulnerable to other malware strains and viruses.

How to stay safe from malware spread through fake updates

Fake updates are one the easiest ways hackers trick victims into infecting their own devices with malware. As such, you should never install any update that appears in a pop-up and this is especially true with Google Chrome.

Google Chrome color-coded update button

(Image credit: Google)

Instead of pestering you with pop-ups when a new Chrome update is available, Google instead displays a bubble next to your profile picture in the top right corner of its browser. The color of the bubble indicates when the latest update was released with green for a 2-day old update, orange for a 4-day old update and red when an update was released at least a week ago. 

Clicking on this bubble will update your browser to the latest version but you can also do so manually by clicking on the three dot menu to the right of your profile picture. From here, you need to go down to the bottom of this menu and click on Help then About Google Chrome. This will take you to Chrome’s settings page and if an update is available, it will be downloaded automatically and applied the next time you restart your browser.

Besides keeping Chrome updated and avoiding pop-ups telling you to update your browser, you should also be using one of the best antivirus software solutions on your PC to help fend off malware infections and other cyberattacks.

Although this campaign is primarily targeting Japanese, Korean and Spanish speakers at the moment, NTT warns that the hackers behind it could be looking to expand further since they recently added new languages. Regardless, if you avoid pop-ups or error messages telling you to update Google Chrome, you should be safe.

More from Tom's Guide

TOPICS
Anthony Spadafora
Managing Editor Security and Home Office

Anthony Spadafora is the managing editor for security and home office furniture at Tom’s Guide where he covers everything from data breaches to password managers and the best way to cover your whole home or business with Wi-Fi. He also reviews standing desks, office chairs and other home office accessories with a penchant for building desk setups. Before joining the team, Anthony wrote for ITProPortal while living in Korea and later for TechRadar Pro after moving back to the US. Based in Houston, Texas, when he’s not writing Anthony can be found tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Read more
A hacker typing quickly on a keyboard
Hackers are posing as Apple and Google to infect Macs with malware — don’t fall for these fake browser updates
A laptop displaying the Chrome logo
Don't click this — malicious ads impersonating Google Chrome spreading dangerous malware
A hacker typing quickly on a keyboard
Thousands of WordPress sites hijacked to spread Windows and Mac malware - how to stay safe
and image of the Google Chrome logo on a laptop
Billions of Chrome users at risk from new browser-hijacking Syncjacking attack — how to stay safe
and image of the Google Chrome logo on a laptop
Over 600,000 Chrome users at risk after 16 browser extensions compromised by hackers — what you need to know
and image of the Google Chrome logo on a laptop
Popular Chrome extensions hijacked by hackers in widespread cyberattack — 3.2 million at risk
Latest in Malware & Adware
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
An FBI agent typing on a computer
FBI issues warning to millions of Americans to avoid these websites that can steal your passwords and banking info
A hacker typing quickly on a keyboard
New MassJacker malware is hijacking digital wallets to steal large sums from users
A person trying to set up a new Wi-Fi router
Thousands of TP-Link routers have been infected by a botnet to spread malware
A smartphone screen displaying the Android name and logo next to a sign reading 'MALWARE'.
Fake Google Play Store pages are spreading Trojan malware that can steal your financial data
Latest in News
Nothing Phone 3a Pro rear side showing the camera
Nothing Phone 3a could start charging for using AI features — and I think that's a terrible idea
ChatGPT logo on phone
ChatGPT’s new image generator is now 'delayed for a while' for free users
iPhone 17 Pro Max render
iPhone 17 Pro may not record 8K video after all (Update)
Screenshots of the new Garmin Connect+ premium features
Garmin launches a paywall — here are all the premium Connect+ features that will cost you $6.99 a month
NYTimes Connections
NYT Connections today hints and answers — Thursday, March 27 (#655)
Apple Intelligence on an iPhone screen
Apple Maps data will be used to train AI models — here's what we know