Technology

Hackers Have Found a New Way to Force Chrome Users Into Revealing Their Google Passwords – Here's What You Need to Know!

2024-09-16

In a troubling new trend for Google Chrome users, hackers are employing a devious tactic to coerce individuals into revealing their Google account passwords through sheer annoyance. This newly discovered credential-stealing scheme involves a sophisticated malware known as StealC, which seizes control of the Chrome browser by locking it in kiosk mode. In this mode, both the F11 and ESC keys are rendered useless, trapping the user in a full-screen mode that displays nothing but a login screen, often for their own Google account.

How Hackers Manipulate Victims

Cybercriminals have long explored various methods to compromise users' Google accounts, a gateway to not only Gmail but sensitive data like cryptocurrency wallets. Recently, tactics have become more advanced, ranging from optical character recognition that targets crypto passwords to requests disguised as permission for reading SMS messages to steal two-factor authentication codes. Now, the StealC malware takes a more straightforward yet reliable approach—driving the user into a corner of frustration until they willingly hand over their credentials.

Research conducted by Open Analysis Lab (OALabs) reveals that this malicious operation has been active since at least August 22, 2024. The process entails launching the victim's browser in kiosk mode, directing them straight to a Google login page, and preventing any attempts to navigate away. The only course of action left for the beleaguered victim is to enter their Google credentials, which the malware promptly captures and sends to the hacker's server.

Credential Flusher: A New and Deceptive Facade

What makes this scheme particularly chilling is that the credential-flushing malware is not a direct thief; instead, it acts as an intermediary that exploits user frustration. It facilitates the process of persuading victims to enter their credentials voluntarily. Once the user complies, the StealC malware does the dirty work of extracting these credentials from the Chrome browser's storage.

Additionally, this malicious endeavor relies on tools like the Amadey hacking utility, prevalent in cyber attacks for the past six years. The attack sequence generally follows this pattern: 1. The victim becomes infected with Amadey. 2. Amadey loads the StealC malware. 3. The credential flusher launches the hijacked Chrome browser in kiosk mode. 4. The victim is cornered into entering their login details, which are subsequently stolen by StealC.

The TrickMo Trojan Emerges

As if the StealC threat wasn't alarming enough, another disturbing development has emerged—a variant of the banking Trojan TrickMo. Researchers from Cleafy have uncovered that this variant masquerades as the Google Chrome app for Android. Victims who download this fake application are misled into believing their Google Play store needs an update, only to be guided into downloading a second, malicious application that requests invasive user permissions, paving the way for the interception of SMS and two-factor authentication codes.

This new TrickMo version employs advanced techniques to avoid detection. For instance, it uses malformed Zip archive files that mimic critical system files, complicating forensic analysis and making removal attempts by cybersecurity programs significantly harder.

How to Protect Yourself

While it may seem daunting, it's still feasible to escape from kiosk mode without relying on the ESC or F11 keys. Bleeping Computer suggests trying key combinations like Alt + F4, Ctrl + Shift + Esc, or Ctrl + Alt + Delete to access the Task Manager and terminate the restrictive Chrome session. Alternatively, using the Win Key + R to launch a command prompt can allow users to kill the Chrome process with a simple command.

In extreme cases, force-shutting down your computer may be necessary, but ensure that you restart in Safe Mode afterward to conduct a comprehensive malware scan. Tools like Malwarebytes offer free scanning options that can help cleanse your system from such infections.

To avoid falling victim to the TrickMo Trojan, it's imperative to download Android applications strictly from the official Google Play Store, steering clear of any third-party sources. Protecting yourself online has never been more crucial—stay informed and vigilant!