Urgent warning to all 3 billion Chrome users over URL scam stealing social security numbers and banking data

Importance Score: 85 / 100 🟢

FBI Issues Alert for Google Chrome Users: Beware of Phony File Converter Websites

The Federal Bureau of Investigation (FBI) has cautioned Google Chrome users about a looming threat: deceptive URLs employed by cybercriminals to pilfer personal data. This alert underscores the importance of vigilance in online activities, particularly when utilizing file conversion tools.

Malicious File Conversion Scam: How It Works

According to the agency, hackers are fabricating websites that fraudulently offer file conversion services, such as transforming .doc files to .pdf format. These compromised sites are laden with malicious code designed to infiltrate users’ systems.

Upon unwittingly downloading the tainted program, victims expose themselves to significant risks. Cybercriminals gain unauthorized entry to sensitive information, including Social Security numbers, passwords, and financial details. The FBI has issued this caution to the expansive user base of Chrome, estimated at three billion individuals.

Expert Commentary on the Cyber Threat

Vikki Migoya, a public affairs specialist with the FBI Denver division, highlighted the insidious nature of this cyberattack. “Regrettably, numerous victims remain unaware of malware infection until considerable damage is inflicted,” she stated. “Often, the realization dawns only when their systems are crippled by ransomware or their identities are compromised.”

FBI Recommendations to Safeguard Your Data

To mitigate the risk of falling victim to this scam, the FBI advises Chrome users to exercise caution and adhere to the following guidelines:

  • Avoid downloading file converters from unfamiliar websites. Stick to reputable and verified sources for file conversion needs.
  • Immediately contact your financial institutions if you suspect you have been targeted by this scam. Prompt notification can help prevent fraudulent transactions and secure your accounts.
  • Run current antivirus software scans to detect and eliminate any potentially harmful software that may have been installed by scammers. Regular system scans are crucial for maintaining digital safety.
  • Consider seeking professional assistance from a reputable company specializing in virus and malware removal services. Expert intervention can be invaluable in thoroughly очистке your system and restoring its security.

Expanding Scope of the Scam: MP3 and MP4 Download Tools

The FBI warning extends beyond file converters, indicating that MP3 and MP4 downloading tools are also being exploited in this widespread scam.

Migoya further explained the deceptive tactics employed by cybercriminals: “Scammers endeavor to replicate legitimate URLs, often making subtle alterations such as modifying a single letter or substituting ‘INC’ for ‘CO’.” This mimicry aims to deceive users into believing they are accessing trustworthy sites.

She also noted the increased vulnerability of users who commonly search for “free online file converter” via search engines. “Search engine algorithms may now prioritize paid results, which unfortunately can include fraudulent scam websites,” Migoya added.

Reporting Cybercrime: IC3.gov

The FBI urges individuals who believe they have fallen victim to this scam to file a comprehensive report with the Internet Crime Complaint Center (IC3) through their website, IC3.gov. Reporting cyber incidents is crucial for law enforcement to track and combat online crime.

связь to Lee Enterprises Ransomware Attack

The agency has suggested that a malicious file converter might be implicated in the recent ransomware assault on Iowa-based media conglomerate, Lee Enterprises, as reported by CBS News.

Lee Enterprises, with operations spanning over 70 towns nationwide, was targeted by this cyber scam in February.

On February 12th, the company filed a formal report with the U.S. Securities and Exchange Commission (SEC), acknowledging a “systems outage triggered by a cybersecurity attack.”

The SEC filing further detailed the incident: “Preliminary investigations suggest unauthorized access to the Company’s network by threat actors, resulting in the encryption of critical applications and the exfiltration of certain files.”

“Active forensic analysis is underway to ascertain whether sensitive data or Personally Identifiable Information (PII) has been compromised,” the report stated, adding, “Currently, definitive evidence remains elusive, and the investigation is ongoing.”

Compromised Chrome Extensions: Another Layer of Threat

GitLab Threat Intelligence’s cybersecurity team issued a separate alert earlier this year concerning Google Chrome, uncovering approximately 16 browser extensions compromised by hackers.

List of Compromised Browser Extensions:

Among the identified malicious extensions are:

  • Blipshot
  • Emojis
  • Color Changer for YouTube
  • Video Effects for YouTube
  • Audio Enhancer
  • Themes for Chrome
  • YouTube Picture in Picture
  • Mike Adblock für Chrome
  • Super Dark Mode
  • Emoji Keyboard Emojis for Chrome
  • Adblocker for Chrome
  • Adblock for You
  • Adblock for Chrome
  • Nimble Capture
  • KProxy
  • Page Refresh
  • Wistia Video Downloader

These compromised extensions facilitate data theft and “search engine fraud,” a scheme to fraudulently inflate website traffic to hacker-controlled sites for advertising revenue.

Removal of Malicious Extensions and User Action

Security researchers have confirmed that Chrome has since removed these malicious extensions from its Web Store.

However, users who have previously downloaded these extensions must manually uninstall them from their browsers to ensure their security.

Critically, all the compromised Chrome extensions exploited permissions that granted them broad access to interact with any website visited by users.

This unrestricted access enabled the injection of malicious code into visited websites. Effectively, these compromised Chrome add-ons became conduits for spreading the hacker’s malicious code across the web wherever affected users browsed.

Best Practices for Browser Extension Security

The most effective strategy to prevent browser extension hijacking is to rigorously evaluate programs before installation and carefully review user feedback for any warning signs of potential risks.

This scrutiny should include a thorough examination of the “permissions” sought by an extension, specifically identifying which files or device functions the program requests access to upon user authorization. Understanding these permissions is crucial for informed decision-making and maintaining online safety.


🕐 Top News in the Last Hour By Importance Score

# Title 📊 i-Score
1 Mykonos sees severe flooding after storm as tourists told to stay away 🔴 75 / 100
2 ‘We will not let French people have election stolen from them,’ says Le Pen – Europe live 🔴 70 / 100
3 Volcanic eruption begins in Iceland 🔴 65 / 100
4 Drivers are only just realising what the hidden handles in cars are actually used for 🔵 55 / 100
5 F1 LIVE: Red Bull make radical car change for Japanese GP as Norris gets wake-up call 🔵 52 / 100
6 Spider-Man 4 title and release date announced as Tom Holland teases Marvel epic’s plot 🔵 50 / 100
7 WWE star John Cena reveals shock past cancer diagnosis – and how years of neglect finally caught up with him 🔵 45 / 100
8 Car accident that has left Jeffrey Epstein victim Virginia Giuffre with 'only four days left to live' was just a 'minor crash', say Australian police 🔵 45 / 100
9 Best Phones in 2025 | Top-Rated Smartphones and Cellphones Compared 🔵 45 / 100
10 Lorraine Kelly defends Phillip Schofield as she gives update on his hard life 🔵 45 / 100

View More Top News ➡️