Beware - that Google Chrome update alert might actually just be malware

Malware
(Image credit: Pixabay)

There are multiple fake “update your browser” campaigns active right now that are aiming to trick people into installing all kinds of malware on their devices.

A new report from Proofpoint observed at least four different campaigns, delivering different malicious software to the victims. The first thing these groups do is compromise legitimate websites in one of a number of ways, from brute-forcing their way in to leveraging vulnerabilities in different modules of the websites. 

Once they gain access, they modify the site to display a popup that impersonates Google, Mozilla, Microsoft, or other companies with their own browser (depending on what the user is running at the time of the visit). The popup informs the user that their browser is outdated, and if they want to view the content of the site, they need to download and install an update.


Reader Offer: $50 Amazon gift card with demo

Reader Offer: $50 Amazon gift card with demo
Perimeter 81's Malware Protection intercepts threats at the delivery stage to prevent known malware, polymorphic attacks, zero-day exploits, and more. Let your people use the web freely without risking data and network security.

Preferred partner (What does this mean?

Infostealers and other malware

How people end up on these sites is anyone’s guess. Some must be frequent visitors, but others might get a link through an email or a social media message, or could even stumble upon the sites through SEO poisoning or malicious ad campaigns. 

In any case, if they download and run the “update”, they will infect their endpoint with one of these malware (at least in this latest instance): SocGholish, NETSupport RAT, Lumma, Redline, or Raccoon v2. All of these are capable of extracting sensitive information from the victim, which can later be used for either stage-two attacks, or identity theft. 

The best way to protect against these kinds of attacks is to use common sense. None of the biggest browser makers request their users to update their browsers in order to view the content, and even if they do want them to update - they wouldn’t do it through a pop-up window. Most browsers are automatically updated in the background, without user interaction.

More from TechRadar Pro

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
These fake macOS updates are actually just looking to spread malware
A finger touching the google chrome icon in the Windows 10 start menu
A new Chrome browser highjacking attack could affect billions of users - here's how to fight it
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
Over 10,000 WordPress sites found showing fake Google browser update pages to spread malware
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Mac users targeted with new malware, so be on your guard
Representational image of a cybercriminal
Criminals are spreading malware disguised as DeepSeek AI
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
A Lego Pikachu tail next to a Pebble OS watch and a screenshot of Assassin's Creed Shadow
ICYMI: the week's 7 biggest tech stories from LG's excellent new OLED TV to our Assassin's Creed Shadow review
Samuel and Romy standing very close together in A24's Babygirl movie
Everything new on Max in April 2025, including A24's Babygirl and The Last of Us season 2
An AMD Radeon RX 9070 XT made by Sapphire on a table with its retail packaging
AMD’s secret weapon against Nvidia seems to be stock – way more RX 9070 GPUs are rumored to be hitting shelves than RTX 5000 models
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks