• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

Chrome extension Trojan tricks victims in an endless malware loop

{{postValue.id}}

People in several Central and South American countries who wanted to watch a video online are affected by a Trojan that redirects the viewers to a new URL that contains malicious content.

These events were discovered by ESET research team when there was a spike in the JS/ChromeX.Submelius threats activity. This redirect happens when the victim presses to play a video. When it is clicked a new window appears demanding the victim to download a Chrome extension and it will not close until the victim relents and downloads the extension.

That first downloads opens a window for the hacker to take up permission to read or change all of the user’ s data on sites which was visited by the victim to inject malware into each site.

“ Then, while the user is browsing the internet, they will suddenly see new windows opening up with information about their system, taking them to other websites containing downloads of malicious code, advertising, or other kinds of content. This becomes an endless loop, which ultimately will benefit whoever is behind the fraudulent extension,” ESET wrote.

The cure for this is easy, finding the rogue extension and deleting it the Chrome extension are will help the victims to get out of this endless loop they are trapped in.

Tags:
andrew
Author: 

Comments ( 1 )

Thiago79178
Establish mechanisms for regular feedback from businesses on the effectiveness of collaborative programs and make necessary adjustments.
Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 5 )

Q

How do Trojans work?

A

Most trojans come in two parts, a Client, and a Server, but there are exceptions where the trojan does not need a Client, as it's able to automatically do what it was intended to do (stealing passwords, business data etc.), without any intervention from the attacker.

Q

What are the most common Trojans?

A

They are,
Remote Access Trojans (RAT's)
Password Sending Trojans
Keyloggers
Proxy/Wingate Trojans
DeDenial Of Service (DoS) Attack Trojans
FTP Trojans
structive
Software Detection Killers

Q

Is Trojan virus dangerous?

A

A Trojan can have one or multiple destructive uses—that is what makes them so dangerous. It's also important to realize that unlike viruses, Trojans are not self-replicating and are only spread by users who mistakenly download them, usually from an email attachment or by visiting an infected site.

Q

What is Trojan Horse attack?

A

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

Q

How does malware work?

A

Trojan horses masquerade as harmless programs, but when activated, they damage their host computer. Unlike a virus, a Trojan horse does not replicate itself; instead, this malware usually attempts to steal files or passwords. Computer worms replicate themselves to spread through a network.

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Lucas ?
Various options in Top command

Am using Top command only to view the load average, what are the various options in Top command..??

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.