Hackers Abuse Google Alerts to Promote a Fake Adobe Flash Player Update that Installs Malware


Google Alerts is a content modification detection and notification service, used by the online search engine company Google. The service sends emails to the user when it finds brand-new results, such as websites, paper posts, blogs, or scientific research, that match the users search term.

Upon clicking the fake stories utilizing a Google redirect link, the visitor will be redirected to the risk actors malicious site (as shown below).

The bad stars create phony stories with titles consisting of popular keywords that Google Search then indexes. Once indexed, Google Alerts will notify people who are following those keywords.

According to BleepingComputer, danger stars are utilizing Google Alerts to promote a phony Adobe Flash Player updater that sets up other unwanted programs on unsuspecting users computer systems.

Example Google Alerts link for a fake story

After clicking the phony storys URL directly, the website will specify that the page does not exist.

When directly checking out the URL, Page does not exist

Professionals also observed fake stories being indexed by Google and pressed out by Google Alerts. These have been redirecting users to websites pushing web browser notice spam, undesirable extensions, or phony giveaways.

An Alleged Flash Updater is Offered

The most current scam that states your Flash Player is obsoleted and then prompts you to set up an updater.

Website mentioning Flash Player needs to be updated

Setting up these programs naturally causes harmful activity or unwanted habits that only benefits the application designers.

Professionals mention that if you are redirected to a website, through Google Alerts, Google Search, or any other methods and are triggered to install an extension or program update, just close the browser.

As soon as Clicked the Update button, the victim will download a setup.msi file that installs a possibly undesirable program called One Updater. Even if “One Updater” is not malware, similar software application in the past has actually installed password-stealing Trojans and cryptocurrency miners.

You can follow us on Linkedin, Twitter, Facebook for everyday Cybersecurity, and hacking news updates.

Check out

Google Published a Research Blog About who are the People Prone to cyber-attacks via Email

Apple New Proxy Feature to Prevent Leaking IP Addresses to Google