the potential target into clicking on the provided URL . In addition , the victim feels safe since the link comes fromAttack.Phishingone of his Facebook friends . The message usually includes a short line that looks similar to “ its you ? [ name ] : |. ” The emoji at the end of the message differs , and the provided link is shortened ; therefore the user can not figure out where it leads . However , the shortcut indicates that the link leads to a mysterious video and triggers victim ’ s curiosity to check it out . Typical strategy : Install something to watch the video Cybersecurity experts are already familiar with the technique used to trickAttack.Phishingquestioning users into installing the Facebook Message Video virus . As soon as the victim clicks the compromised link and enters the phishing website ( which apparently is designed to look likeAttack.PhishingYouTube or another popular video sharing platform ) , a misleading pop-up appearsAttack.Phishing, asking the victim to install an update or an application ( it could be a fake Adobe Flash Player or a plug-in ) . The file suggested to the user contains no software related to video streaming and simply carries the malicious payload that later compromisesAttack.Databreachvictim ’ s account and sends outAttack.Phishingthe deceptive messages to all victim ’ s contacts . Speaking of fake Adobe Flash Players , we want to inform you that these are one of the most dangerous threats to your security . One of the latest cyber attacksAttack.Phishingwas based on fake pop-ups appearing on compromised sites , urgingAttack.Phishingpeople to install an updated Flash Player . Unfortunately , launching the install_flash_player.exe file only infected the computer with Bad Rabbit ransomware .
Chrome users have lately been targeted with a few unusual malware delivery and scam attempts . The first one comes fromAttack.Phishingcompromised WordPress sites that have been modifiedAttack.Phishingto include JavaScript that changes the text rendering . A visitor sees the page as an unreadable mish-mash of symbols , and is promptedAttack.Phishingto update “ Chrome ’ s language pack ” so that the text is rendered correctly and he or she is able to read it : “ The usage of a a clean , well-formatted dialog to presentAttack.Phishingthe message with the correct Chrome logo – and , more importantly , – the correct shade of blue for the update button . The shape of the update button seems correct , and the spelling and grammar are definitely good enough to get a pass , ” NeoSmart Technologies ’ Mahmoud Al-Qudsi noted . wrong version numbers ) during the download and installation process , but not all will . The bad news is that Windows Defender or Chrome don ’ t flag the file as malware and , at the time of the initial discovery , very few AV engines detected it as malicious ( the situation is much better now ) . Chrome will tell users that “ this file isn ’ t downloaded very often ” as a warning of its potential malicious nature , but that ’ s unlikely to stop users who are accustomed to click through security warnings . The second threat comes in the form of a malicious Chrome extension that is pushed onto visitors of compromised sites . The potential victims are redirected to such sites mostly through malvertising schemes , and they are faced with the request to install the extension in order to be able to leave the site – no other option is given , and the browser is stuck in a never ending loop of fullscreen modes . The extension aims to redirect victims to unwanted software , get-rich-quick schemes , and various scams . “ This extension ensures it stays in hiding by using a 1×1 pixel image as its logo and by hooking chrome : //extensions and chrome : //settings such that any attempt to access those is automatically redirected to chrome : //apps . That makes it much more difficult for the average user to see what extensions they have , let alone uninstalling one of them , ” Malwarebytes ’ Jérôme Segura explains . Victims will have to use a security solution to do it , and likely another browser to search for it and install it . Malwarebytes detects this extension as Rogue.ForcedExtension