Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Say co-founder

    August 5, 2025

    Android gets patches for exploited Qualcomm defects in attacks

    August 5, 2025

    Chatgpt can no longer ask you to break with your lover

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»How-To»This invisible malware is using reliable Google URL using hijack checkout pages, and you will never see it
    How-To

    This invisible malware is using reliable Google URL using hijack checkout pages, and you will never see it

    PineapplesUpdateBy PineapplesUpdateJune 14, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    This invisible malware is using reliable Google URL using hijack checkout pages, and you will never see it
    Share
    Facebook Twitter LinkedIn Pinterest Email


    This invisible malware is using reliable Google URL using hijack checkout pages, and you will never see it


    • The attackers use the actual Google URL to set the previous antivirus of antivirus and to set in your browser
    • This malware is only active during checkouts, making it a silent threat to online payment.
    • The script opens a websocket connection for live control, which is completely invisible to the average user

    A new browser-based malware campaign has surfaced, showing how the attackers are now exploiting reliable domains like Google.com, which is to bypass traditional antivirus defense.

    A Report From security researchers on C/Side, this method has been triggered subtle, conditionally, and is difficult for both users and traditional security software.

    It originates from a valid Oauth-related URL, but secretly executes a malicious payload with full access to the user’s browser session.

    You may like

    Malware hidden in plain vision

    The attack begins with an embedded script in a compromised Magento-based ecommerce site, which seems to reflect a harmless Google oauth logout URL: https://accounts.gouth2/revoke.

    However, this URL includes an manipulation callback parameter, which decodes and runs an obfuscated javaascript payload using Eval (Atob (…)).

    The use of Google’s domain is central for deception – as the script loads from a reliable source, most of the material safety policies (CSPs) and DNS filters allow it without any question.

    This script is active only under specific conditions. If the browser appears automatic or the URL contains the word “checkout”, it quietly opens a websocket connection to a malicious server. This means that this user can tailor malicious behavior for tasks.

    To get all the top news, opinions, facilities and guidance, sign up on Techradar Pro Newsletter, which your business needs to be successful!

    Any payload base sent via this channel is 64-encoded, decoded, and the function of JavaScript is dynamically executed using the constitution.

    The attacker can run a code from a distance in the browser in real time with this setup.

    One of the primary factors affecting the efficacy of this attack is that the current market has the ability to avoid many best antivirus programs.

    The argument of the script is very high and is active only under certain conditions, making it the best Android antivirus apps and static malware scanners also unlikely to detect.

    They appear that JavaScript will not inspect, flag, or block the JavaScript payloads distributed through the valid Oauth flow.

    DNS-based filters or firewall rules also provide limited protection, as the initial request is for Google’s legitimate domain.

    In the enterprise environment, even some of the best closing point safety equipment can struggle to detect this activity if they rely too much on the domain reputation or fail to observe the dynamic script execution within the browsers.

    While advanced users and cyber security teams can use material inspection proxy or behavioral analysis tools to identify these anomalies such as these, the average users are still weak.

    Limiting third-party scripts, separating browser sessions used for financial transactions, and the remaining vigilance about unexpected site behavior can help reduce the risk in all short term.

    You might also like

    checkout Google hijack invisible Malware pages reliable URL
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleLitcoin price struggles despite ETF optimism
    Next Article See Mexico vs. Dominican Republic on Tubi (this is free)
    PineapplesUpdate
    • Website

    Related Posts

    AI/ML

    Got 6 hours? This free AI training from Google and goodwill can promote your start today

    August 4, 2025
    Apps

    Google Pixel 9A does not have a camera bar, but this is not the only reason I like

    August 2, 2025
    Security

    CISA Open-SOS Thorium Platform for Malware, Forensic Analysis

    August 2, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Say co-founder

    August 5, 2025

    Android gets patches for exploited Qualcomm defects in attacks

    August 5, 2025

    Chatgpt can no longer ask you to break with your lover

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.