It is Fitzgerald Financial Group's top priority to keep your financial information secure. With this in mind, we wanted to keep you updated with new way attackers are attempting to get your information by phishing in browsers.
Commonwealth’s Security Operations team recently identified activity related to malicious campaigns involving fake browser updates. These are unique phishing attempts designed to trick users into downloading malicious software on their systems through the following methods:
Attackers are distributing fake browser update notifications that, when clicked, download and install malicious software disguised as legitimate computing software.
Users are tricked into believing they need to update their browser or software, leading to the download of malicious files.
While traditional phishing attempts are typically executed via email, threat actors in this case are behaving differently—through a link in an email, but also through legitimate websites (usually hosted on platforms like WordPress). Once the user opens a website, they are redirected to a pop-up window or second page that prompts them to update their browser.
After the user clicks the button prompting the “browser update,” they are redirected once more and malware begins downloading onto their machine.
Next Steps
To ensure additional security of sensitive information, please take the following steps:
Be cautious of unexpected prompts for software updates: Always verify the legitimacy of software updates by visiting the official website of the software vendor directly, rather than clicking on pop-up messages or links in emails.
Monitor files for suspicious downloads: Be on the lookout for files named “update.js” or other unexpected files in your download folders. These can be indicators of a malicious download.
Watch for unusual computer activity: Be wary of any unusual behavior on your computer, such as unexpected slowdowns, pop-ups, or changes in settings. These could be signs of a compromised system. If you suspect your computer has been compromised, seek professional tech support from either your computer manufacturer or local tech support offerings.
Report suspicious activity: If you encounter or suspect any malicious activity, report it right away. Quick reporting can help mitigate potential damage. Any potential incidents should be submitted to the FBI’s Internet Crime Compliant Center (IC3) or the Cybersecurity and Infrastructure Security Agency (CISA).
Commonwealth is actively monitoring this situation and will provide updates if further impact is identified. Please don’t hesitate to contact my office with any questions or concerns.