New Google Chrome Pirateo: Users will have to act now

Update, February 9, 2025: This story, first, published on February 7, has been updated with news of more security problems, this time for users of Chrome’s own operational formula.

Google Security made the news this week for all the right reasons, because the researchers discovered a day of 0 Critic Linux for Android users and published a Zen alert for unpleasant vulnerability of AMD chips. There was even correct news about how Google has brought a critical security update for Gmail users who have had an incredibly positive effect so far. But before exciting it and regrets to provide a drop in the procedure, Safety Mavens warns in opposition to a risk without stopping that the goals that other people seek to download the Google Chrome Web Browser application. This is what you want to know.

Shmuel Uzan through Morphisec Menazing Labs reported how existing pirate attacks led to a “malicious software on several complicated floors called Valleyrat” and use an educational discharge strategy to hang patients in search of the Google Application Chrome browser. All he wants to know is that a car discharge is what the user authorizes without really knowing the truth of what is downloaded. To achieve this, Uzan said, he observed the attackers who employed “PHISHING ELECTRONICS, Malicious Internet sites and instant messaging platforms. ” In the new attack of this type, Uzan said, the risk actor “created an online domain and page designed to imitate a Chinese telecommunications company called Karlos”, to deliver the malicious application.

Jamie Akhtar, CEO of Cybersmart, said that even if Malware Valleyrat itself is a well -established malicious software, after being observed in 2023, which makes these latest notable attacks the sophistication that turns out to have evolved in terms of techniques used and preferred objectives. “The Crusade is explicitly aimed at finance, sales and accounting professionals due to its proximity to delicate knowledge, that the technique” spray and pray “previous crosses,” said Akhtar. Recognizing that it turns out that the existing crusade is for Chinese users, Akhtar said that others deserve not to be apathetic with the threat. “If there is one thing about cybercriminals, it is because someone will copy this technique and apply it to Western companies. ” As such, Akhtar concluded: “We urge anyone who is executed in a processing of delicate knowledge in the higher value, such as sales or accounting, to be more vigilant when downloading equipment such as navigators or extensions browsers. “

“The software download includes a risk, especially if the individual discharge of the software does not verify that the descending ads of an official website,” said Erich Kron, defender of security awareness in Knowbe4, “practices to accommodate malicious binary and then poison.

They are not just those more recent driving download attacks than Chrome users, more than 3 billion, deserve to be aware: the vulnerabilities of protection in the browser deserve to be treated as well. A few months were agitated for the warnings of the safety vulnerability of Chrome browser, with new ones that appear week after week. The last one, as indicated on February 5, had an effect on users through the ecosystems of Android, Linux, Macos and Windows. The consultation of the vulnerability of sin is:

Now Google has shown that many of its own users of Chromeos ecoformulas escape vulnerability threats. “A new 126. 0. 6478. 264 edition of LTS-126 (platform edition: 15886. 89. 0) is being deployed for maximum chromeos devices,” Andy Wu showed from the Google Chromeos team. The new edition of Google’s operational formula includes corrective for two new superior protection vulnerabilities:

So be sure that your copy of chrome, browser or operational formula is updated. Fortunately, Google automates the process, however, your browser must be activated after the update, so verify it through assistance | Google Chrome menus are recommended.

A community. Many voices.   Create a lazy account to pry your thoughts.  

Our network is attached to other people through open and considered conversations. We need our readers to prove their reviews and exchange concepts and made in a space.

To do this, follow the publication regulations the situations of use of our site.   We have summarized some of those key regulations below. In other words, keep it civil.

Your message will be rejected if we realize that it turns out to contain:

The user accounts will block if we realize or that users are compromised:

So how can you be a difficult user?

Thanks for reading our network directives. Read the complete list of publication regulations discovered the situations of use of our site.

Leave a Comment

Your email address will not be published. Required fields are marked *