Malwarebytes says a fake Google Account security page is distributing 'what may be one of the most fully featured browser-based surveillance toolkits we have observed in the wild'

An angler using Google as bait.
(Image credit: Chris Stein)

Cybersecurity provider Malwarebytes has thrown up a red flag regarding a fake Google Account security page that it says is distributing "what may be one of the most fully featured browser-based surveillance toolkits we have observed in the wild", and it's capable of infecting Windows, Apple, and Google Android devices.

In a blog post breaking down the methodology of the attack, Malwarebytes says that the infiltration begins with what appears to be a genuine Google Account security check, from a page with Google's familiar stylesheet and with an official-looking domain.

Back angle Hacker wearing hoodies cloth motivation emotion and typing coding to hacking cryptocurrency from internet at home

(Image credit: skaman306 via Getty Images)

"Close the browser tab and the page script stops. Clipboard monitoring and SMS interception end immediately," says Malwarebytes. "But the service worker remains registered. If the victim granted notification permissions, the attacker can still wake it silently, push a new task, or trigger a data upload without reopening the app. And if the victim ever opens it again, collection resumes instantly."

The malware also operates as a WebSocket relay, which means it can act as an HTTP Proxy and be used to gain access to corporate networks, bypassing IP-based access controls and funnelling traffic through the victim's IP address. "Once connected, the attacker can route arbitrary web requests through the victim’s browser as if they were browsing from the victim’s own network", says Malwarebytes.

The fun doesn't stop there, either. On Android devices, a separately-installed APK disguised as a "critical security update" includes a custom keyboard capable of capturing keystrokes, a notification listener for capturing two-factor authentication codes, an accessibility service that can observe screen content, and an autofill intercepting service to capture user credential fill requests. Oh, and microphone recording, of course. Fabulous.

Phew. It's about as comprehensive as malware gets by the looks of things, and getting rid of it seems to be something of a convoluted process. Malwarebytes provides step-by-step removal instructions for Windows and macOS users, including Chrome, Firefox, and Safari-specific options, along with some Android and iOS-focused steps to take if you've been duped into falling for its charms on your mobile device.

It's certainly one of the most nefarious-looking trojans I've ever read about, and the fact that it's capable of gaining access to your system via most of the popular browsers on Windows, Apple, and Android devices is deeply concerning. Pay attention to what you're clicking on, folks—it's a dangerous world out there.

Secretlab Titan Evo gaming chair in Royal colouring, on a white background
Best PC gaming kit 2026

1. Best gaming chair: Secretlab Titan Evo

2. Best gaming desk: Secretlab Magnus Pro XL

3. Best gaming headset: Razer BlackShark V3

4. Best gaming keyboard: Asus ROG Strix Scope II 96 Wireless

5. Best gaming mouse: Razer DeathAdder V4 Pro

6. Best PC controller: GameSir G7 Pro

7. Best steering wheel: Logitech G Pro Racing Wheel

8. Best microphone: Shure MV6 USB Gaming Microphone

9. Best webcam: Elgato Facecam MK.2


👉Check out our list of guides👈

TOPICS
Andy Edser
Hardware Writer

Andy built his first gaming PC at the tender age of 12, when IDE cables were a thing and high resolution wasn't—and he hasn't stopped since. Now working as a hardware writer for PC Gamer, Andy spends his time jumping around the world attending product launches and trade shows, all the while reviewing every bit of PC gaming hardware he can get his hands on. You name it, if it's interesting hardware he'll write words about it, with opinions and everything.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.