Malicious reCAPTCHA Pretending To Be From Google Creates Chaos
Since 1999, Google’s name has resonated to mean “don’t be evil”, with the main goal of collecting all the world’s information and presenting it to everyone in a very digestible way. The search giant has built this good name for two-decades now, as the company celebrates its 20th anniversary this 2019. Of course, with popularity and being a household name and dependable brand in the tech industry, there will be people that will be motivated to name drop Google for their own goals. One such incident is the fake reCAPTCHA scam, causing malware infection that subjects unsuspecting Android users to a phishing attack, without them realizing about it.
The attack is specifically targeting the Android mobile platform, as one of the phishing-loaded trojan horse file it used to propagate is using the .apk format. APK is the package format that installs apps in Android, and by nature is an executable file in an Android device. The other format of the trojan horse is a zip file, hence this enables the malware to also propagate in Windows and even MacOS.
The unique capability of the malware is to anticipate any two-factor authentication attempts from an SMS. It hooks directly to the SMS app, recording the contents of it and also creates a network transfer to its authors. The website owners that distributes this trojan is not aware that their own websites are infected. The problem is not all web owners are programmers or developers themselves to check the actual code that runs their websites. These CMS-using web owners need to coordinate with their webhosting provider, as they have the facility to conduct investigation on the account to make sure it is not storing or hosting malware.
“The malicious directories used in these campaigns are uploaded to a website after it has been compromised. When dealing with this type of malware, it is important to delete the files contained in a complaint., however; we strongly encourage administrators to scan all other existing website files and database for malware as well. You’ll also want to update all of your passwords to prevent the attackers from accessing the environment again,” said Leal.
We at Hacker combat, we wish all web owners to be assured of their site’s security. Hence, we offer a Free Website Malware Scanner, now live in hacker combat. The free website scanner can help website owners determine if their website is still clean or have been injected with malware by someone else. Old version of content management software or plugins can make it vulnerable to malware injection, it is prudent to use a free malware scanner we offer in order to give website owners a fighting chance to determine their site’s security.
Kevin Jones951 Posts
Kevin Jones, Ph.D., is a research associate and a Cyber Security Author with experience in Penetration Testing, Vulnerability Assessments, Monitoring solutions, Surveillance and Offensive technologies etc. Currently, he is a freelance writer on latest security news and other happenings. He has authored numerous articles and exploits which can be found on popular sites like hackercombat.com and others.