Security News

Fake ‘Google Safety Centre’ Phishing Scam Deploys Malware Disguised as Google Authenticator

Written by Lore Apostol
Published on August 9, 2024

A phishing site masquerading as an official ‘Google Safety Centre’ page deploys malware like Latrodectus and ACR Stealer while pretending to let users download the trusted multi-factor authentication (MFA) app Google Authenticator, a report from Cyble Research and Intelligence Lab (CRIL) says.

A loader with a valid digital signature, “GoogleAuthSetup.exe,” is downloaded instead of the legitimate Authenticator app. Once the user runs the executable, it pretends the installation was unsuccessful while covertly downloading and executing ACR Stealer and Latrodectus.  

Fake Google Authenticator Website
Image Source: Cyble

ACR Stealer obscures its Command and Control (C2) server details via Dead Drop Resolver (DDR) to evade detection, embedding this information within seemingly safe locations or platforms. In this case, the infostealer hides the C2 details on the Steam Community website.

The malware targets Web browsers, email and FTP clients, crypto wallets, messaging apps, VPNs like AzireVPN and NordVPN, and password managers, as well as MySQL Workbench, AnyDesk, snowflake-ssh, Sticky Notes, and more.

Fake Google Authenticator Propagation
Image Source: Cyble

Latrodectus was made by the creators of IcedID and is actively developed, showing updates to its encryption key pattern and new commands. 

This month, a fake advertisement for Authenticator that seemed to come from official sources appeared among Google search results, and the advertiser’s identity was even verified by Google. The ad led to a decoy website leading to a signed payload hosted on GitHub, where people actually downloaded the DeerStealer malware.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: