Home OSINT News Signals
CYBER2026-02-27

Inside a fake Google security check that becomes a browser RAT

A sophisticated new malware campaign is masquerading as a Google Chrome security check to deliver a powerful remote access trojan (RAT) directly into victims' browsers. Security researchers have uncovered the operation, which begins with a convincing phishing email prompting users to verify their browser's safety. This attack chain exploits a critical zero-day vulnerability in a popular browser extension, allowing the malware to bypass standard security protocols undetected.

The phishing emails are carefully crafted to appear as official notifications from Google, warning recipients of a critical security flaw in their Chrome installation. A prominent button urges users to run an immediate "Chrome Security Check." Clicking the link does not download a traditional file but instead loads a malicious webpage that executes a script exploiting the unpatched extension vulnerability. This zero-day exploit grants the attackers deep access to the browser's core processes.

Once the exploit is successful, the malware deploys a JavaScript-based RAT directly within the browser environment. This RAT is exceptionally stealthy, operating entirely in memory without writing malicious files to the system's disk. It gives attackers complete remote control over the victim's browser session, enabling them to steal cookies, session tokens, login credentials, and monitor all activity in real time. The operators can then pivot to internal corporate systems or online banking sessions.

Researchers note that the attackers are specifically using this access to hijack cryptocurrency and blockchain-related accounts. By capturing login details and session cookies, they can bypass two-factor authentication on exchange platforms and digital wallets. The stolen crypto assets are immediately funneled through a series of blockchain transactions designed to obscure the money trail, making recovery nearly impossible for victims.

This campaign highlights a dangerous evolution in cybercrime, moving from loud, system-encrypting ransomware to silent, persistent data theft. While ransomware attacks like data breaches that lock files for crypto payments are still prevalent, this browser-based RAT focuses on long-term espionage and direct financial theft from high-value targets. The use of a zero-day vulnerability in a trusted extension demonstrates the attackers' significant resources and technical skill.

Experts urge both individuals and organizations to maintain extreme caution with unsolicited security emails. Users should never run "security checks" from email links and should instead navigate directly to their browser's official settings. Keeping all software, especially browser extensions, updated to the latest versions is critical to patching known vulnerabilities. Companies are advised to implement advanced endpoint detection and to educate employees on the latest phishing techniques to prevent such stealthy intrusions.

Back to News