Fake ad blocker breaks PCs in new malware extension scam

Fake ad blocker breaks PCs in new malware extension scam

Security researchers have recently uncovered a sophisticated and alarming cyber threat involving a malicious browser extension called NexShield, which targeted users of Google Chrome and Microsoft Edge browsers. Unlike typical fake extensions that merely trick users into installing unwanted software, NexShield took a more aggressive and manipulative approach by deliberately crashing the user’s browser and then coercing them into running harmful commands that compromised their own computer. This discovery highlights an evolving landscape in cybercrime, where attackers combine technical exploits with psychological manipulation to maximize damage.

NexShield was disguised as a lightweight, privacy-focused ad blocker, falsely claiming to be developed by Raymond Hill, the legitimate creator of the widely trusted uBlock Origin extension. This false association helped the extension gain initial trust and spread through paid online advertisements and search engine results. Before being removed from the official Chrome Web Store, the extension was able to attract a number of unsuspecting users. However, once installed, NexShield immediately began to wreak havoc in the background by overloading the browser’s internal processes.

According to cybersecurity firm Huntress, NexShield opened a large number of internal browser connections repeatedly, causing a rapid depletion of system memory. This led to the browser tabs freezing, CPU usage soaring, and the system’s RAM filling up until the browser ultimately hung or crashed. When users restarted their browser after such a crash, they were greeted with a frightening pop-up warning claiming that their system was infected with serious security issues. The pop-up then prompted users to “scan” or “fix” the problem by following on-screen instructions that directed them to open the Windows Command Prompt and paste a pre-copied command.

This command was the real trap. When executed, it ran a hidden PowerShell script that downloaded and installed malware onto the user’s computer. To avoid immediate detection, the attackers programmed the malware to delay its execution by up to an hour after the extension’s installation, allowing the malicious activity to be distanced from the initial cause. This strategy complicates efforts by security software and investigators to link the malware to the extension installation.

This type of attack is a new variant of the known ClickFix scam, a social engineering tactic that tricks victims into executing harmful commands under the guise of “fixing” a computer problem. Huntress researchers have dubbed this variant “CrashFix” because, unlike earlier scams that only simulated system failures, NexShield actually induced a genuine browser crash to create urgency and panic in the victim. The attackers behind this campaign, identified as the threat group KongTuke, appear to be shifting their focus towards enterprise environments where the potential financial gains from successful intrusions are much larger.

In corporate settings, the malware payload delivered by NexShield includes a Python-based remote access tool called ModeloRAT. This tool grants attackers significant control over infected systems, allowing them to spy on user activity, execute arbitrary commands, alter system configurations, deploy additional malware, and maintain persistent access over long periods. Although individual home users were not the primary target, this does not mean they are immune to the threat. Even if the consumer-targeted malware component was incomplete, simply uninstalling the extension may not eradicate all malicious remnants, leaving systems vulnerable.

One of the most dangerous aspects of this attack is the exploitation of user trust. By masquerading as a helpful utility and creating a sense of urgency through a real system crash, NexShield pressures victims to take immediate action without considering the risks. Cybersecurity experts emphasize that no legitimate browser extension will ever ask users to open Command Prompt or run manual commands to fix issues. Such requests are clear red flags indicating malicious intent.

Microsoft’s Vice President of Threat Protection, Tanmay Ganacharya, highlighted that Microsoft Defender includes built-in protections designed to detect and block malicious browser extensions and the harmful behaviors associated with them. Microsoft continuously updates its security technologies to combat evolving threats like NexShield. Consumers and organizations are encouraged to follow best security practices and to exercise caution when dealing with unexpected prompts or requests to run system commands. Microsoft has also published detailed guidance on defending against ClickFix-style social engineering attacks in their security blog.

In addition to relying on built-in protections, users can take several proactive steps to reduce their risk of falling victim to malicious browser extensions. Before installing any extension, it is crucial to verify the publisher’s identity, review the official website, and check the update history and user reviews. Genuine extensions typically have a well-documented developer presence and a long track record of positive feedback. Users should be especially wary of new extensions that claim association with well

Previous Post Next Post

نموذج الاتصال