ChromeLoader malware rages around the world, attacking both Windows and Mac

ChromeLoader malicious code can attack victims on many levels, mildly annoying, but heavy can cheat or install more malicious code, ransomware.

This month, ChromeLoader malware is growing strongly in number after destructive on a steady scale since the beginning of the year. This makes browser hacking a widespread threat.

ChromeLoader is a browser-intrusive malware capable of modifying the victim's web browser settings to display search results for spam software ads, run tags to access fake survey sites, and give fake gifts. impersonation, advertising adult games and dating sites.

Those behind this malware will get financial benefit through affiliate marketing system.

There is a lot of malware of this type but ChromeLoader stands out for its persistence, scale, and infection path through active abuse of PowerShell.

Abuse of PowerShell

According to Red Canary researchers, who have been monitoring ChromeLoader's activity since February, the operators use a malicious ISO archive to infect victims with malicious code.

Often malicious ISO files will be disguised as cracked software and games for victims to download and activate themselves. There are even ads on Twitter for cracked Android games with QR codes that lead directly to a malware download page.

ChromeLoader malware rages around the world, attacking both Windows and Mac Picture 1ChromeLoader malware rages around the world, attacking both Windows and Mac Picture 1

When the user double-clicks the malicious ISO file, it will be mounted as a virtual CD-ROM drive. It will contain executable files with the .exe extension. When run it will fire up ChromeLoader and decode a PowerShell command with the ability to fetch the remote resource archive and load it as a Google Chrome extension.

Once done, PowerShell will delete scheduled tasks that have infected Chrome with an extension with the ability to silently infiltrate the browser and manipulate search results and other behaviors.

macOS is also attacked

The guys behind ChromeLoader also target computers running macOS. They want to manipulate both Chrome and Safari running on macOS.

The infection chain on macOS is similar to that on Windows, but instead of ISO, they use a DMG (Apple Disk Imgage) file, a format more common on Apple's operating system.

ChromeLoader malware rages around the world, attacking both Windows and Mac Picture 2ChromeLoader malware rages around the world, attacking both Windows and Mac Picture 2

Furthermore, instead of executing the installer, the ChromeLoader variant on macOS uses the installer's bash script to download and extract the ChromeLoader exension in the "private/var/tmp" directory.

To stay present for as long as possible, ChromeLoader will add a preferences file ('plist') to the '/Library/LaunchAgents' folder. This ensures that every time a user logs into a graphical session, ChromeLoader's Bash script can continuously run.

Alternatively, you can also check other browser settings for anything unusual. If strange settings are detected, restore to factory mode to solve the problem.

4 ★ | 1 Vote