back to article Malware crooks find an in with fake browser updates, in case real ones weren't bad enough

An uptick in cybercriminals masking malicious downloads as fake browser updates is being spotted by security researchers. Mimicking the success of the tactics adopted by the years-old SocGholish malware, researchers at Proofpoint have drawn attention to cybercriminals increasingly emulating the fake browser update lure. …

  1. Anonymous Coward
    Terminator

    Malicious infostealer malware infecting machines

    “The new campaign, which we call FakeSG, also relies on hacked WordPress websites to display a custom landing page mimicking the victim's browser.”

    “FakeSG campaigns use hijacked (WordPress) websites to trick visitors into downloading/installing malware (NetSupport Manager). The sites include code that modifies the page to appear as the victim's browser urging an update.”

  2. garwhale

    Seems like big bounties on the people behind malware could be cheap at half the price. Also, no reason for a hosted WordPress etc. installations not to take some simple actions, like locking/unlocking code for update.

    Introduce an international best practices code for published software, websites, cybersecurity, backups etc, with a scale of warnings and increasing fines tailored to popularity and revenue. Increase security support for software to 10 years. The fines can go to pay for the oversight. Make it illegal to pay ransoms. Community service penalties for C-suits.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like