Chrome and Edge users, beware: avoid copying and pasting unfamiliar text into your terminal or run dialog box. Cybersecurity experts have found a new trick that cybercriminals are using to spread malware.
The Threat
Hackers are tricking users into copying and pasting malicious code. This code infects computers with malware. The trick often involves a pop-up message that seems to indicate an error. The message instructs users to copy and paste text into a PowerShell terminal or the Windows Run dialog box.
How It Works
While browsing on Chrome and Edge, you might see a pop-up suggesting there’s an error. It provides instructions to copy and paste some text to fix the issue. The message looks legitimate, making it easy to fall for the trick. Once the malicious script runs, it can download and install malware, often without you noticing.
The Danger
These attacks aim to steal credentials or trigger fraudulent actions, like cryptocurrency transactions. Given the large number of Chrome and Edge users, these attacks are becoming more common and dangerous.
How to Stay Safe
- Use Official Sources: Only download apps and updates from official stores. Avoid third-party sites.
- Be Cautious with Links: Don’t click on links that download software directly. Go to official websites to perform updates.
- Verify Legitimacy: Before installing anything, check its reviews and ratings to ensure it’s safe.
Stay Vigilant
The digital world is always changing, with new threats emerging. This latest trick is part of a broader trend where attackers use various methods to compromise devices. Staying informed and following basic cybersecurity practices can help you stay safe.
By adhering to these simple rules and staying informed, you can significantly reduce the risk of falling victim to these attacks. Your online safety is in your hands—stay alert and protect yourself from these emerging threats.
We manage your cybersecurity with comprehensive measures, but it's important for you and your team to be aware of the threats out there and follow basic cybersecurity practices to stay safe, especially when using personal devices to access company information.
Technology to analyze your IT infrastructure.
Learn more about our business productivity process.
Get a customized IT strategy built for just for you.
Watch your productivity levels and customer experience improve.