Some of the biggest and most popular browsers out there are being attacked by hackers once again with a new malware strain that aims to steal people’s sensitive data. Let’s dive into it and see how you can protect yourself.
What does the new malware strain do?
Browsers like Google Chrome, Microsoft Edge, and others are being attacked by a malware strain according to a new report released by Trustwave SpiderLabs.
The strain, known now as Rilide, can do a variety of malicious actions including monitoring browsing history, taking screenshots on people’s devices, and stealing cryptocurrency using scripts injected into websites. Rilide is also capable of intercepting two-factor authentication codes and taking over email accounts, so it’s really one to watch out closely for as it can be super damaging.
Rilide uses a loader that modifies the browser shortcut files and then automates the malicious browser extension dropped onto infected systems by the malware. Once that’s done, it runs a script that monitors when a user infected by the malware does actions such as switching tabs, receiving content from the web, or when a web page finishes loading.
The hackers also have a list of target websites on a command and control server. The loader will check if the website user matches anything on the list. If there’s a match, it will load additional scripts that are injected into a web page to steal sensitive information from victims.
How does Rilide spread?
The way the strain is being spread amongst users is through a fake Google Drive browser extension. Plus, the hackers are also abusing Google Ads and the Aurora Stealer to load the extension using a Rust loader. For reference, a Rust loader is software that loads and prepares Rust programs for execution by resolving any missing pieces needed to run the program. The hackers are likely using a Malware-as-a-Service business model to sell Rilide to other cybercriminals who then use it to continue attacking more people like a domino effect.
MORE: BEWARE OF NEW MACSTEALER MALWARE THAT CAN STEAL YOUR ICLOUD KEYCHAIN DATA AND PASSWORDS
How can I protect myself?
Get Antivirus Software
The best way to protect yourself from this kind of malware is to have antivirus software installed on all your devices. My #1 recommendation is always TotalAV. Antivirus software will protect you from accidentally clicking malicious links and will remove any malware from your devices.
Special for CyberGuy Readers:$19 your first year (80% off) for TotalAV Antivirus Pro package.
Get my review of best antivirus software here.
Protect your identity
You should also consider using an identity theft service, which will notify you if you have any sensitive data stolen from you such as cryptocurrency information.
If you want a service that will walk you through every step of the reporting and recovery process, one of the best things you can do to protect yourself from this type of fraud is to subscribe to an identity theft service. My top recommendation is Identity Guard. Identity Guard will monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of using Identity Guard includes identity theft insurance of up to 1 million dollars to cover losses and legal fees and a white glove fraud resolution team where a US-based case manager helps you recover any losses.
Special for CyberGuy Readers:Save up to 51% with my top recommendation is Identity Guard.
More of my reviews of best identity theft protection services here.
Install from official sites
Make sure you are only ever installing browser extensions from official sites like the Chrome Web Store or the Microsoft Edge Add-ons store. These will further guarantee that you won’t become the victim of some bogus browser trying to steal your data.
What do you think of these popular browsers being attacked again? We want to hear from you.
More:
- How do I protect myself against malware
- How hackers are using ChatGPT to create malware to target you