This invisible malware kidnaps payment pages with trusted Google URL, and will never see it coming


  • The attackers use real Google URL to sneak malware beyond the antivirus and their browser without detecting
  • This malware is only activated during payment, so it is a silent threat to online payments
  • The script opens a websockt connection for live control, completely invisible to the average user

A new malware campaign has appeared based on the browser, demonstrating how the attackers are now exploiting trusted domains such as Google.com to avoid traditional antivirus defenses.

A report of security researchers in C/SIDE, this method is subtle, conditionally activated and is difficult for users and conventional security software.

scroll to top