Technology
Why that Google Meet error might be a sneaky hacker trick
A new scam called ClickFix is targeting users and is on the rise in the U.S. As the name suggests, it prompts you to click on a link, claiming to fix an issue, but in reality it infects your computer with malware.
I reported on this earlier, detailing how threat actors used messages impersonating errors from Google Chrome, Microsoft Word and OneDrive to infect users’ computers.
Now, a similar type of attack is affecting Google Meet users, regardless of whether they’re using a Windows PC or a Mac. I explain how this cyberattack works and what you can do to protect yourself.
I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
How the Google Meet trap works
According to French cybersecurity company Sekoia, it all starts with an email containing a link to a Google Meet. The email can come from any address and may be socially engineered to look like it’s related to your organization. It could link to a Google Meet invite for a meeting, webinar, online collaboration or something similar. When you click on the link, you’ll be directed to a fake Google Meet page, which will soon display a warning claiming there’s an issue with your PC. It might say your microphone or camera isn’t working or there’s a problem with your headset.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
You can expect to see the following URLs in these fake meeting emails:
meet[.]google[.]us-join[.]com
meet[.]google[.]web-join[.]com
meet[.]googie[.]com-join[.]us
meet[.]google[.]cdm-join[.]us
This fake page will also display a pop-up offering to fix the issue, showing phrases like “Press the key combination” or “CTRL+V.” When you follow these instructions, malicious code is pasted into the Windows prompt, infecting your computer with malware. Once the code is on your computer, hackers can gain access to your cryptocurrencies, sensitive files and personal information.
Sekoia has uncovered several other malware distribution clusters beyond Google Meet. These include platforms like Zoom, PDF readers, fake video games (such as Lunacy, Calipso, Battleforge and Ragon), web3 browsers and projects like NGT Studio and messenger apps such as Nortex.
DON’T LET SNOOPS NEARBY LISTEN TO YOUR VOICEMAIL WITH THIS QUICK TIP
The bigger picture
Back in July, McAfee noticed that ClickFix campaigns were ramping up, especially in the U.S. and Japan (via Bleeping Computer). Lately, two groups – Slavic Nation Empire and Scamquerteo – have been behind some of these attacks. Both are said to be offshoots of larger crypto scam gangs Marko Polo and CryptoLove.
Earlier this year, Proofpoint found that malware was spreading by pretending to be fake error messages for Google Chrome, Word and OneDrive, tricking people into downloading malicious code. They also pointed out a method called “email lure,” where hackers send fake emails pretending to be from MS Word to infect computers.
BEST ANTIVIRUS FOR PCS, MACS, IPHONES AND ANDROIDS – CYBERGUY PICKS
4 ways to protect yourself from harmful software
The fake Google Meet page creates a sense of urgency, making users click on the links and unknowingly compromise their devices. There are several steps you can take to protect yourself from such cyberattacks.
1. Have strong antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
2. Monitor your accounts: Regularly review your bank statements, credit card statements and other financial accounts for any unauthorized activity. If you notice any suspicious transactions, report them immediately to your bank or credit card company.
3. Place a fraud alert: Contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification.
4. Enable two-factor authentication: Enable two-factor authentication whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
Kurt’s key takeaways
Hackers have come up with sneaky ways to trick you into installing malware. They use social engineering to make emails and website prompts look legit, hoping you’ll click on a link and follow their instructions. The best way to protect yourself is by avoiding unknown links and always checking the URL of the page you’re on before taking any action.
Have you ever received an email or prompt that looked suspicious but seemed legitimate at first glance? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Honda has a plan to build solid-state batteries for EVs
Honda set up a demonstration facility in Japan to show off its plans to mass-produce solid-state batteries at lower costs, which could be crucial to unlocking higher-range, longer-lasting electric vehicles for the future.
Solid-state batteries have been elusive for many companies due to the complexity of scaling up production. The technology swaps out the liquid electrolytes found in current lithium-ion batteries with dry conductive materials, promising higher energy density and longer lifespans. But it will require a whole new production process to be successful.
Honda says it is accelerating research at its new 27,000 square-meter demo facility set up in Sakura City, Japan, and is shortening the time required to make a single unit. The site has full-scale equipment that is split between three buildings: the first for cathode formation and cell assembly; the second for anode formation; and the third for electrolyte activation and module assembly.
The plan includes using a continuous inline mixer that Honda says is “three times faster” than typical cell batch processing. Honda plans to make batteries on this line in January.
Honda is readying its solid-state tech for mass production in the second half of the 2020s. The company’s CEO Toshihiro Mibe has eluded that solid-state batteries will also be the key to unlocking cheaper EVs.
Technology
How your browser is spying on you: Hidden dangers lurking behind every click
A browser is one of the most popular apps we use. It’s the gateway between the internet and its users, translating raw code into something we perceive as a web page and allowing us to interact with the web. It’s safe to say that anyone who uses the internet uses a web browser.
But while this tool is extremely useful, it can also be equally dangerous. For example, clicking malicious links can redirect you to harmful websites that either steal personal information or infect your device with malware.
If you use a search engine like Google through Chrome, it can collect data on your searches, browsing history and even your location (if location services are enabled). Most browsers also use cookies, small files that store information about your online behavior. Let’s discuss the risks associated with web browsers and how to stay safe.
I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
How a browser doubles as spyware
Browsers are much more than simple tools to navigate the web. They are, in many ways, tools for surveillance. While they help you access websites and services, they also track your every move online to feed the ever-hungry advertising industry.
First off, most browsers collect data about your searches, browsing habits and even your location. This data isn’t just stored to “improve your experience,” it’s used to create a detailed profile of you, which is then shared with advertisers who target you with personalized ads.
Google Chrome, for example, is notorious for tracking your activity. As you browse, it feeds data to Google’s advertising engine, allowing it to serve highly targeted ads based on your behavior. This includes everything from your search history to the websites you visit, even down to the smallest detail, like how long you stay on a page.
“Google may share information about you with advertisers, business partners, sponsors, and other third parties,” Google boldly mentions on its privacy policy page.
Browsers also use cookies to keep tabs on you. These cookies track your activity across different sites, even after you’ve left a site. This means that ads you saw on one website might follow you across others, creating a persistent digital footprint. And while cookies can be blocked or deleted, many websites rely on them to function, making it hard to escape this kind of tracking.
MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC
Even Incognito mode isn’t safe
Even if you’re using privacy-focused browsers or tools like Incognito mode, they don’t really guarantee privacy. A 2020 class-action lawsuit revealed that Google kept scraping searches by gathering data from users browsing in Incognito through ad tools used by websites, picking up “potentially embarrassing” searches from millions of people. Google then used that data to track web traffic and sell ads.
It’s not just Google. Your internet service provider, the websites you visit and even governments can monitor your browsing activity, even in Incognito mode. All it does is hide your activity from your local browser history.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
TOP 6 HIDDEN WAYS A VPN CAN SAVE YOU MONEY NOW
How to protect your privacy
As you all know, web browsers are essential tools for accessing the internet, but many popular options compromise your privacy by collecting extensive data. While Google Chrome is widely used, it tracks significant amounts of user information to power targeted advertising. However, there are several privacy-focused browser alternatives that prioritize user data protection. Also, to enhance your online security and protect your personal information, consider implementing these essential cybersecurity practices.
Keep software updated: Regularly update your operating system, browsers and other software to patch security vulnerabilities. Enable automatic updates whenever possible to ensure you’re always protected against the latest threats.
Use strong, unique passwords: Create complex passwords for each of your accounts and avoid reusing them. Consider using a password manager to generate and securely store strong passwords.
Enable two-factor authentication (2FA): Activate 2FA on all accounts that offer it. This adds an extra layer of security by requiring a second form of verification beyond your password.
Be cautious with emails and links: Avoid opening suspicious emails or clicking on unknown links. These could be phishing attempts designed to steal your information or infect your device with malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
Use secure networks: When using public Wi-Fi, connect through a VPN to encrypt your internet traffic. For sensitive transactions, stick to secure, private networks.
Be mindful of social media sharing: Limit the personal information you share on social media platforms and adjust your privacy settings to control who can view your posts.
VPN: Your first line of defense against browser spying: A VPN (virtual private network) encrypts your internet connection, making it difficult for anyone, including your browser, to track your online activities. By masking your IP address and routing your traffic through secure servers, a VPN not only protects your personal data from prying eyes but also helps you avoid targeted advertising and potential data breaches.
Regardless of whether you are new to VPNs or not, you’ll want to choose trusted VPN providers known for robust encryption and no-log policies to ensure your privacy. Whether for sensitive tasks or everyday use, reputable VPN services will boost both your security and speed. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.
By implementing these security practices and using privacy-focused browsers, you can significantly enhance your online safety and protect your personal data while browsing the web. Remember, cybersecurity is an ongoing process that requires vigilance and regular updates to your practices.
WHY YOU SHOULD BE USING A VPN TO SAFEGUARD YOUR STOCK TRADING ACTIVITIES
Kurt’s key takeaway
The web browser is an essential tool for accessing the internet, but it also opens the door to a host of privacy and security risks. Whether it’s being tracked for ads, snooped on by your ISP or accidentally stumbling onto a malware-filled site, the risks are everywhere. Tools like Incognito mode or cookie-blocking can help a bit, but they’re not enough to truly protect you. If you’re serious about staying private and secure, you need to up your game. Use a VPN, be cautious about what you click on and stay informed about the ways your browser might be working against you.
Do you think companies have gone too far with tracking? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
KURT’S HOLIDAY GIFT GUIDES
Unbeatable Best Black Friday deals
Best gifts for Men | Women | Kids | Teens | Pet lovers
Best deals: Laptops | Desktops
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
T-Mobile actually stopped some hackers from stealing customer data
T-Mobile isn’t exactly known for having a stellar track record against hackers, but it seems that the company actually caught a recent cyberattack in progress and shut it down in time. Bloomberg reports that T-Mobile detected suspicious activity in a recent attempt to access customer data and kicked the cyber criminals out before they were able to infiltrate deeper levels of the network.
The report doesn’t name the hackers or the date when the breach occurred, but details are consistent with the recent Salt Typhoon attack in which Chinese hackers targeted US telecom companies — including T-Mobile. Targets of that attack included members of the Trump and Harris campaigns. Hackers successfully breached Verizon, T-Mobile, and Lumen ISPs. China has denied any involvement.
I don’t know about you, but I didn’t have “T-Mobile swiftly shuts down cyber attack” on my bingo card this month. The company disclosed nine security breaches between 2018 and early 2023 alone, including a massive breach in 2021 that exposed sensitive data of more than 47 million customers and prospective customers. There was another major incident in 2023, too, when a hacker obtained account data from 37 million customers in a breach that went undetected for over a month. You know it’s bad when the FCC tells you to shape up. T-Mobile isn’t in a big hurry to take credit for this latest effort, though; the company didn’t immediately respond to our request for comment.
-
News1 week ago
Herbert Smith Freehills to merge with US-based law firm Kramer Levin
-
Business1 week ago
Column: OpenAI just scored a huge victory in a copyright case … or did it?
-
Health1 week ago
Bird flu leaves teen in critical condition after country's first reported case
-
Business4 days ago
Column: Molly White's message for journalists going freelance — be ready for the pitfalls
-
World1 week ago
Sarah Palin, NY Times Have Explored Settlement, as Judge Sets Defamation Retrial
-
Politics3 days ago
Trump taps FCC member Brendan Carr to lead agency: 'Warrior for Free Speech'
-
Science1 day ago
Trump nominates Dr. Oz to head Medicare and Medicaid and help take on 'illness industrial complex'
-
Technology3 days ago
Inside Elon Musk’s messy breakup with OpenAI