Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Fusion startup Helion hits blistering temps as it races toward 2028 deadline

    February 13, 2026

    AI burnout, billion-dollar bets, and Silicon Valley’s Epstein problem

    February 13, 2026

    Score, the dating app for people with good credit, is back

    February 13, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Fusion startup Helion hits blistering temps as it races toward 2028 deadline
    • AI burnout, billion-dollar bets, and Silicon Valley’s Epstein problem
    • Score, the dating app for people with good credit, is back
    • Didero lands $30M to put manufacturing procurement on ‘agentic’ autopilot
    • Eclipse backs all-EV marketplace Ever in $31M funding round
    • Complyance raises $20M to help companies manage risk and compliance
    • Meridian raises $17 million to remake the agentic spreadsheet
    • 2026 Joseph C. Belden Innovation Award nominations are open
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Apps»This invisible malware hijacks checkout pages using trusted Google URLs, and you’ll never see it coming
    Apps

    This invisible malware hijacks checkout pages using trusted Google URLs, and you’ll never see it coming

    TechurzBy TechurzJune 15, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Representational image of a hacker
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected
    • This malware only activates during checkout, making it a silent threat to online payments
    • The script opens a WebSocket connection for live control, completely invisible to the average user

    A new browser-based malware campaign has surfaced, demonstrating how attackers are now exploiting trusted domains like Google.com to bypass traditional antivirus defenses.

    A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect.

    It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user’s browser session.


    You may like

    Malware hidden in plain sight

    The attack begins with a script embedded in a compromised Magento-based ecommerce site which references a seemingly harmless Google OAuth logout URL: https://accounts.google.com/o/oauth2/revoke.

    However, this URL includes a manipulated callback parameter, which decodes and runs an obfuscated JavaScript payload using eval(atob(…)).

    The use of Google’s domain is central to the deception – because the script loads from a trusted source, most content security policies (CSPs) and DNS filters allow it through without question.

    This script only activates under specific conditions. If the browser appears automated or the URL includes the word “checkout,” it silently opens a WebSocket connection to a malicious server. This means it can tailor malicious behavior to user actions.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Any payload sent through this channel is base64-encoded, decoded, and executed dynamically using JavaScript’s Function constructor.

    The attacker can remotely run code in the browser in real time with this setup.

    One of the primary factors influencing this attack’s efficacy is its ability to evade many of the best antivirus programs currently on the market.

    The script’s logic is heavily obfuscated and only activates under certain conditions, making it unlikely to be detected by even the best Android antivirus apps and static malware scanners.

    They will not inspect, flag, or block JavaScript payloads delivered through seemingly legitimate OAuth flows.

    DNS-based filters or firewall rules also offer limited protection, since the initial request is to Google’s legitimate domain.

    In the enterprise environment, even some of the best endpoint protection tools may struggle to detect this activity if they rely heavily on domain reputation or fail to inspect dynamic script execution within browsers.

    While advanced users and cybersecurity teams may use content inspection proxies or behavioral analysis tools to identify anomalies like these, average users are still vulnerable.

    Limiting third-party scripts, separating browser sessions used for financial transactions, and remaining vigilant about unexpected site behaviors could all help reduce risk in the short term.

    You might also like

    checkout coming Google hijacks invisible malware Pages trusted URLs youll
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCan AI fact-check its own lies?
    Next Article Essential Steps to Sign Out of Apple ID/Apple Account
    Techurz
    • Website

    Related Posts

    Opinion

    Redwood attracts Google for its $425M Series E as AI power needs rise

    January 29, 2026
    Opinion

    SpaceX is coming to the public markets, and secondaries are already on fire

    January 28, 2026
    Opinion

    Humans&, a ‘human-centric’ AI startup founded by Anthropic, xAI, Google alums, raised $480M seed round

    January 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    College social app Fizz expands into grocery delivery

    September 3, 20251,558 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202514 Views

    The Reason Murderbot’s Tone Feels Off

    May 14, 202511 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    College social app Fizz expands into grocery delivery

    September 3, 20251,558 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202514 Views

    The Reason Murderbot’s Tone Feels Off

    May 14, 202511 Views
    Our Picks

    Fusion startup Helion hits blistering temps as it races toward 2028 deadline

    February 13, 2026

    AI burnout, billion-dollar bets, and Silicon Valley’s Epstein problem

    February 13, 2026

    Score, the dating app for people with good credit, is back

    February 13, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.