OMG spy malware in Google Chrome that may access your camera, microphone, and messages.

Alert for spy malware in Google Chrome that accesses your camera, microphone, and messages

OMG spy malware in Google Chrome that may access your camera, microphone, and messages.

Antivirus software firm Avast discovered an attack targeting a group of journalists located in Lebanon. How to solve it.

  • Avast Threat Intelligence, a Czech antivirus software business, has uncovered previously undiscovered malware in Google Chrome that gave attackers complete access to their victims' PCs. They may use this technique to record via the camera in order to filter the communications that this machine received. It is a zero-day vulnerability (a security weakness for which no fix is currently available) in the Google browser. When this virus attempted to assault Avast consumers in the Middle East using spyware from Israel, the business found it.

Who did the attached happen and who were they?

  • One of the targets in particular was a group of journalists based in Lebanon. "The attackers appear to have infiltrated a website used by news agency personnel," said Jan Vojtek, a corporate researcher. Furthermore, the strike was directed at sites in Turkey, Palestine, and Yemen. Avast researchers traced the attack to Candiru, a Tel Aviv-based spyware company renowned for selling malware to government clients.

How the malware Worked?

  • They apparently initially gathered a profile of the victim's browser, including device type, screen information, time zone, and plugins. The virus was transferred to the user's PC over an encrypted connection if the data matched that of the targeted victims. Once inside, they employed a malicious payload known as DevilsTongue, which elevates the malware's privileges and so gets complete control of the victim's device.

Is there a patch or Fix for this issue?

  • "We can't tell for certain what the attackers were seeking for, but generally the reason attackers go after journalists is to directly spy on them and the stories they're working on, or to get to their sources." and to obtain compromising material and sensitive data that they shared with the press. "An act like this might endanger journalistic freedom," Vojtek added.

On July 4, Google corrected this issue shortly after it was disclosed. To deploy the update, browser users must click when the browser invites them to reboot the system. Meanwhile, Safari users must upgrade their browser to version 15.6.