FakeUpdates malware is a type of malware that creates false prompts for users to download a new update to their computer, browser, or computer program. Once a user accepts, the malware will download onto a device, leading to breaches, the downloading of additional malware or ransomware, or the loss of private login details.
FakeUpdates was one of the leading malware families of 2023 and continued to display high levels into 2024. In 2018, the notorious SocGholish malware made use of FakeUpdates to deliver their malware variant.
FakeUpdates refers to malware that utilizes false browser updates to trick users into downloading malware. FakeUpdates malware infects a website with malware. Once a user navigates to this page, they’ll receive a seemingly normal message that their browser needs an update.
If they click on the popup to download the patch version, they’ll unknowingly download a malware package onto their computer.
FakeUpdates malware is especially successful as it understands that updating to the most recent patch of software is always an advisable cybersecurity tactic. Even those who do not work in cybersecurity will be familiar with the fact that the most recent patch of a program will include any vulnerability fixes.
By manipulating this desire to update, FakeUpdates has become a highly impactful form of malware.
SocGholish, the most well-known malware that falls under the FakeUpdates umbrella, is currently the 5th most common malware type by downloads.
FakeUpdates malware leverages browser popups to display a message that prompts users to update their browser to a more recent version. Some users may even attempt to click the
If you encounter a similar message when entering an unknown website, immediately close the window without clicking on anything on the page. If FakeUpdates malware is able to download onto a device, it will then begin to execute its payloads on your device:
FakeUpdates malware poses a similar threat to other types of malware.
If a user accidentally downloads FakeUpdates malware to their device, it could be the catalyst for security compromises. Some malicious actors may use this malware to:
Alternatively, some threat actors will allow the malware to exist on the system in the background. Without alerting the user to its presence, the malware will then collect sensitive information and relay it back to the cybercriminals that control the malware.
There are several strategies that businesses and individuals can use to reduce the likelihood of encountering FakeUpdates malware:
The MITRE ATT&CK framework is a reference point for cybersecurity professionals that documents all of the potential methods that cybercriminals could resort to when attempting to carry out a cyberattack. As FakeUpdates is a form of malware, it has a chapter within the framework that helps cybersecurity teams to develop effective defensive strategies and understand how this malware works.
Navigating to the SocGholish page in the MITRE ATT&CK framework will offer 18 different security considerations to make – as well as a growing list of groups that use it. By understanding what techniques are most common, your business will be able to identify them and then develop strategies to mitigate them.
FakeUpdates has consistently been one of the top contenders for the most downloaded form of malware for the past few years. Given how common this form of attack is, businesses need to have strategies in place to keep their systems protected and defend against malware.
Check Point Harmony offers an extensive endpoint cybersecurity solution, helping to cover every single one of your company devices with one easy-to-use system. Harmony utilizes AI-powered 360-degree threat prevention:
Request a demo today to ensure your company is fully protected from this cyber threat.