Security News > 2021 > October > Google Chrome is Abused to Deliver Malware as ‘Legit’ Win 10 App

Crooks behind a newly identified malware campaign are targeting Windows 10 with malware that can infect systems via a technique that cleverly bypasses Windows cybersecurity protections called User Account Control.
Iwamaye wrote in a blog post published Thursday, the attack chain is initiated when a Chrome browser user visits a malicious website and a "Browser ad service" prompts the user to take an action.
Attackers are using a compromised website specially crafted to exploit a version of the Chrome browser to deliver the malicious payload, researchers found.
Once notifications were permitted the browser user was alerted that their Chrome web browser needed to be updated.
The malicious Chrome browser update linked to a Windows application package called a MSIX type file.
"The malware we summarized in this blog post has several tricks up its sleeve. Its delivery mechanism via an ad service as a Windows application, Windows application installation path, and UAC bypass technique by manipulation of an environment variable and native scheduled task can go undetected by various security solutions or even by a seasoned SOC analyst," Iwamaye wrote.
News URL
https://threatpost.com/chrome-deliver-malware-as-legit-win-10-app/175884/
Related news
- Google Chrome's AI-powered security feature rolls out to everyone (source)
- Google Chrome disables uBlock Origin for some in Manifest v3 rollout (source)
- Week in review: Exploited 7-Zip 0-day flaw, crypto-stealing malware found on App Store, Google Play (source)
- SpyLend Android malware downloaded 100,000 times from Google Play (source)
- Google Cuts Off uBlock Origin on Chrome as Firefox Stands Firm on Ad Blockers (source)
- Google fixes Chrome zero-day exploited in espionage campaign (source)
- Google fixes exploited Chrome sandbox bypass zero-day (CVE-2025-2783) (source)
- Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks (source)