Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Tecno announces two world first zoom concepts built to remove lens switching issues

    Dell Pro Max no more: Leak reveals Dell Pro Precision 7 16 laptop with Intel Panther Lake processors

    Xperia 1 VIII tipped to launch with major 200 MP camera upgrade but not the Sony sensor you may think

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025

      More of Silicon Valley is building on free Chinese AI

      December 1, 2025

      From Steve Bannon to Elizabeth Warren, backlash erupts over push to block states from regulating AI

      November 23, 2025

      Insurance companies are trying to avoid big payouts by making AI safer

      November 19, 2025
    • Business

      Public GitLab repositories exposed more than 17,000 secrets

      November 29, 2025

      ASUS warns of new critical auth bypass flaw in AiCloud routers

      November 28, 2025

      Windows 11 gets new Cloud Rebuild, Point-in-Time Restore tools

      November 18, 2025

      Government faces questions about why US AWS outage disrupted UK tax office and banking firms

      October 23, 2025

      Amazon’s AWS outage knocked services like Alexa, Snapchat, Fortnite, Venmo and more offline

      October 21, 2025
    • Crypto

      Most Bitcoin On-Chain Indicators Signal a New Bear Market Cycle

      December 3, 2025

      Why the Latest Binance Lawsuit Is More Dangerous Than Any Regulator

      December 3, 2025

      Could the Fusaka Upgrade Light the Fuse for a Pectra-Like 56% Ethereum Price Rally?

      December 3, 2025

      Bitcoin Mining Hit Its Breaking Point — Now AI Is Taking Over Its Racks | US Crypto News

      December 3, 2025

      XRP Jumps 8% as Crypto Whales Scoop Up $1.3 Billion 

      December 3, 2025
    • Technology

      Tecno announces two world first zoom concepts built to remove lens switching issues

      December 4, 2025

      Dell Pro Max no more: Leak reveals Dell Pro Precision 7 16 laptop with Intel Panther Lake processors

      December 4, 2025

      Xperia 1 VIII tipped to launch with major 200 MP camera upgrade but not the Sony sensor you may think

      December 4, 2025

      OnePlus Ace 6T debuts with Snapdragon 8 Gen 5 and biggest battery in company’s history

      December 4, 2025

      RovyVon E10 EDC flashlight launches on Kickstarter with laser pointer, scroll wheel and OLED display

      December 4, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe
    Technology

    Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe

    TechAiVerseBy TechAiVerseJune 15, 2025No Comments3 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe

    Image Credit: Pixabay
    (Image credit: Shutterstock)

    • Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected
    • This malware only activates during checkout, making it a silent threat to online payments
    • The script opens a WebSocket connection for live control, completely invisible to the average user

    A new browser-based malware campaign has surfaced, demonstrating how attackers are now exploiting trusted domains like Google.com to bypass traditional antivirus defenses.

    A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect.

    It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user’s browser session.

    The attack begins with a script embedded in a compromised Magento-based ecommerce site which references a seemingly harmless Google OAuth logout URL: https://accounts.google.com/o/oauth2/revoke.

    However, this URL includes a manipulated callback parameter, which decodes and runs an obfuscated JavaScript payload using eval(atob(…)).

    The use of Google’s domain is central to the deception – because the script loads from a trusted source, most content security policies (CSPs) and DNS filters allow it through without question.

    This script only activates under specific conditions. If the browser appears automated or the URL includes the word “checkout,” it silently opens a WebSocket connection to a malicious server. This means it can tailor malicious behavior to user actions.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Any payload sent through this channel is base64-encoded, decoded, and executed dynamically using JavaScript’s Function constructor.

    The attacker can remotely run code in the browser in real time with this setup.

    One of the primary factors influencing this attack’s efficacy is its ability to evade many of the best antivirus programs currently on the market.

    The script’s logic is heavily obfuscated and only activates under certain conditions, making it unlikely to be detected by even the best Android antivirus apps and static malware scanners.

    They will not inspect, flag, or block JavaScript payloads delivered through seemingly legitimate OAuth flows.

    DNS-based filters or firewall rules also offer limited protection, since the initial request is to Google’s legitimate domain.

    In the enterprise environment, even some of the best endpoint protection tools may struggle to detect this activity if they rely heavily on domain reputation or fail to inspect dynamic script execution within browsers.

    While advanced users and cybersecurity teams may use content inspection proxies or behavioral analysis tools to identify anomalies like these, average users are still vulnerable.

    Limiting third-party scripts, separating browser sessions used for financial transactions, and remaining vigilant about unexpected site behaviors could all help reduce risk in the short term.

    You might also like

    • These are the best VPNs with antivirus you can use right now
    • Take a look at our pick of the best internet security suites
    • HP unveils the future of super-HD video meetings, but it comes at a huge price

    Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master’s and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleGoogle reportedly plans to cut ties with Scale AI
    Next Article The return of the OG: Chinese firm wants to Androidify the BlackBerry Classic and sell it for $400, with Passport and KEYone to follow
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Tecno announces two world first zoom concepts built to remove lens switching issues

    December 4, 2025

    Dell Pro Max no more: Leak reveals Dell Pro Precision 7 16 laptop with Intel Panther Lake processors

    December 4, 2025

    Xperia 1 VIII tipped to launch with major 200 MP camera upgrade but not the Sony sensor you may think

    December 4, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025474 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025161 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202584 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202563 Views
    Don't Miss
    Technology December 4, 2025

    Tecno announces two world first zoom concepts built to remove lens switching issues

    Tecno announces two world first zoom concepts built to remove lens switching issues – NotebookCheck.net…

    Dell Pro Max no more: Leak reveals Dell Pro Precision 7 16 laptop with Intel Panther Lake processors

    Xperia 1 VIII tipped to launch with major 200 MP camera upgrade but not the Sony sensor you may think

    OnePlus Ace 6T debuts with Snapdragon 8 Gen 5 and biggest battery in company’s history

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Tecno announces two world first zoom concepts built to remove lens switching issues

    December 4, 20250 Views

    Dell Pro Max no more: Leak reveals Dell Pro Precision 7 16 laptop with Intel Panther Lake processors

    December 4, 20250 Views

    Xperia 1 VIII tipped to launch with major 200 MP camera upgrade but not the Sony sensor you may think

    December 4, 20250 Views
    Most Popular

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    Volkswagen’s cheapest EV ever is the first to use Rivian software

    March 12, 20250 Views

    Startup studio Hexa acquires majority stake in Veevart, a vertical SaaS platform for museums

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.