Categories: News

Google under attack: Hackers targeted Chrome and Drive

Hackers put Google under attack in the last few days. Thus, they decided to send malicious links to hundreds of thousands of users. So, scammers used one of the Drive features to determine users click on malicious links.

Also, they exploited a zero-day vulnerability, which finally received a patch.

Scammers attacked Google Drive users

Attackers used Google Drive’s collaboration feature. This allows users to invite friends or co-workers to share and cooperate on Google documents, by sending notifications.

Well, attackers found a way to abuse this feature and sent mobile users notifications. But these invited users to collaborate on documents, in which they introduced malicious links.

Their actions seemed legitimate, as the notifications came from Google’s no-reply email address.

Some other times, attackers chose to use simple email messages with the malicious link inside.

Attackers sent most of the notifications in Russian or broken English and used a few lures to trick hundreds of thousands of Google users.

So, these claimed to be “personal notifications” and attackers named the lure either “Personal Notification No 8482” or “Personal Notification No 0684.”

The first one “reminded” to sing into their account. Otherwise account would be deleted in 24 hours. So they should use link, which was, of course, a malicious one.

The second one notified users about an “important notice” of a financial transaction. According to the message, users could see the notice via a malicious link.

Google, forced to patch a new Chrome zero-day

Also, Google released a security update for the Chrome browser, which patched 10 security flaws. One of them was a zero-day vulnerability, which hackers used to have Google under attack.

Google Threat Analysis Group (TAG), which tracks threat actors, discovered the zero-day. Still, the company did not disclose any details about the bug or the group who exploited it.

Afterwards, the company mentioned that the flaw was in the open-source JavaScript engine (V8).

Meanwhile, the company encouraged users to update their browser at least to version 86.0.4240.183, in order to prevent other villains exploit the same flaw.

Laurentiu Titei

Recent Posts

Windows PowerShell: Meaning, Download, Install, Update, Activate, and Use on Windows

Windows PowerShell is a tool built into the Windows operating system that helps you automate…

1 hour ago

KB890830 Windows Malicious Software Removal Tool(MSRT): Download & Use

Worried about malware attacks? Then, you can download the KB890830 Windows Malicious Software Removal Tool…

1 day ago

Checksum File: Meaning, How to Open and Verify It on Windows

Are you worried that the downloaded file may be compromised by malware or other cybersecurity…

4 days ago

ASIO Driver Download and Update for Windows 11/10

Does the delay between playing a note and hearing it back on your computer sound…

5 days ago

How to Set Your Time and Time Zone Manually in Windows 11 & 10

With remote setups becoming common, working in different time zones is no surprise. However, if…

6 days ago

Set Up Windows Hello for Sign-in with Face, Pin & Fingerprint

Windows Hello is a feature in Windows 10 and 11 that lets you log in…

1 week ago