  {"id":469,"date":"2025-03-27T15:30:40","date_gmt":"2025-03-27T19:30:40","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=469"},"modified":"2025-03-27T14:43:23","modified_gmt":"2025-03-27T18:43:23","slug":"njccic-google-chrome-alert-windows-only","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2025\/03\/27\/njccic-google-chrome-alert-windows-only\/","title":{"rendered":"NJCCIC &#8211; Google Chrome Alert [Windows Only]"},"content":{"rendered":"<h2><strong>What We Know:<\/strong><\/h2>\n<p><span style=\"font-weight: 400\">There is a security flaw in the Google Chrome browser that would let Cyber attackers run harmful programs on your computer. If this flaw is exploited, an attacker could take control of both Chrome and potentially the entire computer.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The attacker could install programs, change or delete files, or even create new computer accounts with full access. The attacker could also steal data stored in your browser, including any stored passwords, and steal data from your computer. To stay safe, make sure your browser and computer software is up to date.<\/span><\/p>\n<h2><strong>How Does the Attack Work?<\/strong><\/h2>\n<p><span style=\"font-weight: 400\">An email is sent to users with a malicious link. This could be a registration form to an event, an invitation to view a website, or other forms of unsolicited emails. If a Windows user with a Google Chrome browser clicks on the malicious link their machine gets infected with no additional action from the user.<\/span><\/p>\n<h2><strong>What You Can Do:<\/strong><\/h2>\n<ul>\n<li style=\"font-weight: 400\"><strong>Do not<\/strong><span style=\"font-weight: 400\"> ignore the update messages on your MSU managed devices<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Apply all Google Chrome updates and operating system updates on your personal device<\/span><\/li>\n<li style=\"font-weight: 400\"><strong>Do not<\/strong><span style=\"font-weight: 400\"> interact with links within emails <\/span><strong>if you were not expecting the email<\/strong><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400\">Want to Know More:<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Kaspersky | <\/span><strong><a href=\"https:\/\/www.kaspersky.com\/blog\/forum-troll-apt-with-zero-day-vulnerability\/53215\/\">Operation ForumTroll: APT attack via zero-day vulnerability<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400\">The Hacker News | <\/span><strong><a href=\"https:\/\/thehackernews.com\/2025\/03\/zero-day-alert-google-releases-chrome.html\">Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400\">Forbes | <\/span><strong><a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2025\/03\/26\/google-confirms-chrome-attack-warning-what-you-do-now\/\">Google Confirms Chrome Attack Warning\u2014What You Do Now<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400\">Bleeping Computer | <\/span><strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-fixes-chrome-zero-day-exploited-in-espionage-campaign\/\">Google fixes Chrome zero-day exploited in espionage campaign<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What We Know: There is a security flaw in the Google Chrome browser that would let Cyber attackers run harmful programs on your computer. If this flaw is exploited, an attacker could take control of both Chrome and potentially the entire computer. The attacker could install programs, change or delete files, or even create new [&hellip;]<\/p>\n","protected":false},"author":349,"featured_media":222,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/comments?post=469"}],"version-history":[{"count":2,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/469\/revisions"}],"predecessor-version":[{"id":471,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/469\/revisions\/471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media\/222"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media?parent=469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/categories?post=469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/tags?post=469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}