Security News Windows support scam uses evil cursor attack to hijack Google Chrome sessions

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,154
A tech support scam is using a novel technique to hijack the browsing sessions of Google Chrome users.
Browser locking is one such technique that support scams also employ. This technique focuses on redirecting users to "browlock" pages in an attempt to force them to watch videos for the purpose of ad fraud, cause user browsers to seethe with pop-ups that may eventually freeze and crash systems, or prevent victims from clicking away from a warning that their PC is "infected."

In the latter case, the warning often provides a number for "tech support" to resolve the issue, in which fraudsters may attempt to sell "antivirus" software or gain remote access to a user's PC.

One particular tech support scam, dubbed Partnerstroka, has been tracked by antivirus solutions provider Malwarebytes and has now introduced a novel way to hijack browsing sessions.

On Thursday, researchers revealed the details of the attack technique, dubbed "evil cursor." The campaign redirects users to fake pages which contain the new browlock technique, specifically created to work against the latest Google Chrome build, version 69.0.3497.81.
 

upnorth

Moderator
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,459
zdnet accidentally shared the wrong link to the malwarebyte source. Here's the correct link. Partnerstroka: Large tech support scam operation features latest browser locker - Malwarebytes Labs
browlock_custom_cursor.gif
Thanks for the share @silversurfer
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top