IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Hackers are using Google Alerts to help spread malware

Fake news gives rise to fake alerts that install phony Adobe Flash updates

Hackers have managed to subvert a Google service into tricking unsuspecting users into installing malware.

Cyber criminals have targeted the Google Alerts service, which they have used to push fake updates to the now-defunct Adobe Flash Player. According to reports, hackers have created fake news stories with titles containing popular keywords that Google’s search engine then indexes. When this happens, Google Alerts pushes out notifications to people who follow these keywords.

Since these “stories” come via Google Alerts, hackers hope victims will think the alert is legitimate and will click on the fake story. Doing so leads victims to a malicious site that pushes browser notification spam, unwanted extensions, or fake giveaways.

The latest attack redirects users to a page that states the user’s Flash Player is outdated and needs to be updated. Adobe no longer supports or updates Flash Player, but many victims may not realize this and click on the update button. Microsoft killed Adobe Flash support in its web browsers last January, around the same time as Google, Apple, and Mozilla.

If the victim accepts the update, the page downloads a file that installs a potentially unwanted program called One Updater. This in itself offers to install other potentially unwanted programs. 

Google Alerts users have been advised that if they’re redirected to such websites and are prompted to install an extension or program update to close the browser window immediately.

Javvad Malik, security awareness advocate at KnowBe4, told IT Pro that by manipulating Google Alerts, cyber criminals are finding ingenious ways to get into users' inboxes, as email gateways and spam filters won’t block alerts. 

"Once in the user's inbox, there is a high likelihood that users will click on the link because the alerts are something they expect and trust,” he said.

“It's why users should keep their guard up even with trusted or expected links and if they end up on a page where there are unwanted pop-ups or downloads, they should immediately close the browser window and alert their IT security team to ensure no malicious software has been downloaded."

Featured Resources

IT best practices for accelerating the journey to carbon neutrality

Considerations and pragmatic solutions for IT executives driving sustainable IT

Free Download

The Total Economic Impact™ of IBM Spectrum Virtualize

Cost savings and business benefits enabled by storage built with IBMSpectrum Virtualize

Free download

Using application migration and modernisation to supercharge business agility and resiliency

Modernisation can propel your digital transformation to the next generation

Free Download

The strategic CFO

Why finance transformation propels business value

Free Download

Recommended

SOC modernisation and and the role of XDR
Whitepaper

SOC modernisation and and the role of XDR

16 Mar 2023
GTA V vulnerability exposes PC users to partial remote code execution attacks
vulnerability

GTA V vulnerability exposes PC users to partial remote code execution attacks

23 Jan 2023
MSI to release securer BIOS settings after critical flaw discovered
vulnerability

MSI to release securer BIOS settings after critical flaw discovered

20 Jan 2023
Uber says compromised third-party to blame for data breach
data breaches

Uber says compromised third-party to blame for data breach

13 Dec 2022

Most Popular

HMRC lost nearly 50% more devices in 2022
Hardware

HMRC lost nearly 50% more devices in 2022

17 Mar 2023
The big PSTN switch off: What’s happening between now and 2025?
Sponsored

The big PSTN switch off: What’s happening between now and 2025?

13 Mar 2023
Outlook zero day patch causes headaches for Windows admins
Security

Outlook zero day patch causes headaches for Windows admins

15 Mar 2023