The 3.45 billion users of the Chrome web browser might be puzzled this month, as Google has released two major security updates within just 10 days. Only iOS users seem to have escaped the attention of hackers this time; although the iOS browser has been updated, there are no security alerts. However, Chrome users on Windows, Linux, Mac, and Android platforms are facing four high-severity security vulnerabilities. Here’s what you need to know and do.
It’s not unusual for Google to issue security updates for Chrome, given its position as the market leader. However, releasing two updates addressing multiple vulnerabilities within 10 days is rare. The last update on September 17 fixed six vulnerabilities, with only one rated as high. This time, all four vulnerabilities are rated as high, urging users on all platforms, except iOS, to update immediately.
A stable channel update for desktop users of Chrome, along with another for Android users, announced the release of Chrome version 129.0.6668.70/.71 for Windows and Mac, 129.0.6668.70 for Linux, and 129.0.6668.70 for Android.
As usual, the update will roll out in the coming days, and the specific details of the vulnerabilities will not be disclosed until most users have updated and protected themselves.
The Four High-Severity Chrome Security Vulnerabilities
The latest Chrome update addresses the following security issues:
– CVE-2024-9120: A use-after-free memory vulnerability in Dawn, the open-source graphics processing mapping implementation used by Chrome.
– CVE-2024-9121: An inappropriate implementation vulnerability in V8, Chrome’s open-source high-performance JavaScript and WebAssembly engine.
– CVE-2024-9122: A type confusion vulnerability, also in the V8 engine.
– CVE-2024-9123: An integer overflow vulnerability in the open-source Skia 2D graphics library.
How to Ensure Your Chrome Web Browser Is Updated and Secure
Users should update Google Chrome by going to the Help|About option in the menu. If the update is available, it will start downloading automatically. It is crucial to restart your browser after installing the update to be protected by the new security patches.
ChromeLoader Exploit Takes Over Your Web Browser
According to the latest HP Wolf security threat insights report for September 2024, threat actors are using the ChromeLoader web browser malware in sophisticated attacks. While ChromeLoader itself isn’t new, the latest campaigns are more polished and can hijack a web browser session, redirecting users to malicious sites. Recent ChromeLoader attacks use malicious advertising, or malvertising, to trick victims into visiting sites offering free productivity tools, with PDF converter sites being a common destination.
According to the latest HP Wolf security threat insights report for September 2024, threat actors are leveraging the ChromeLoader web browser malware in sophisticated attacks. While ChromeLoader itself isn’t new, the latest campaigns are more refined than previous ones. The HP Wolf report warns that these campaigns can effectively hijack web browser sessions, redirecting users to malicious, attacker-controlled sites. Recent ChromeLoader attacks have utilized malicious advertising, or malvertising, to lure victims into visiting websites offering free productivity tools, with PDF converter sites being a common target.
Part of the refinement in the ChromeLoader campaign involves creating fake companies and associated websites. This tactic allows attackers to use genuine code-signing certificates for malware disguised as PDF software, enabling them to bypass Windows security policies during installation and reducing the likelihood of detection by anti-malware protection.
Google provides a support page to help users deal with unwanted ads and malware. Additionally, Malwarebytes has extensive information dating back to 2022 on ChromeLoader and how to remove it. Be sure to search the Malwarebytes forums for full details.
Source: Forbes