Fake Google Security site uses PWA app to steal credentials, MFA codes


Fake Google Security site uses PWA app to steal credentials, MFA codes

A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time passcodes, harvesting cryptocurrency wallet addresses, and proxying attacker traffic through victims’ browsers.

​The attack leverages Progressive Web App (PWA) features and social engineering to deceive users into believing they are interacting with a legitimate Google Security web page and inadvertently installing the malware.

PWAs run in the browser and can be installed from a website, just like a standalone regular application, which is displayed in its own window without any visible browser controls.

Victim browser becomes attacker’s proxy

The campaign relies on social engineering to obtain the necessary permissions from the user under the guise of a security check and increased protection for devices.

The cybercriminals use the domain google-prism[.]com, which poses as a legitimate security-related service from Google, showing a four-step setup process that includes giving risky permissions and installing a malicious PWA app. In some instances, the site will also promote a companion Android app to “protect” contacts.

According to researchers at cybersecurity company Malwarebytes, the PWA app can exfiltrate contacts, real-time GPS data, and clipboard contents.

Additional functionality observed includes acting as a network proxy and internal port scanner, which allows the attacker to route requests through the victim’s browser and identify live hosts on the network.

The website also requests permissions to access text and images copied to the clipboard, which can occur only when the app is open.

Fake Google security site asking for clipboard access
Fake Google security site asking for clipboard access
source: BleepingComputer

However, the fake website also asks for permission to show notifications, which allows the attacker to push alerts, new tasks, or trigger data exfiltration.

Additionally, the malware uses the WebOTP API on supported browsers in an attempt to intercept SMS verification codes, and checks the /api/heartbeat every 30 seconds for new commands.

As the PWA app can only steal the contents of the clipboard and OTP codes when it is open, notifications can be used to send fake security alerts that prompt the user to open the PWA again.

Fake Google security site asks for notifications permissions
Fake Google security site asks for notifications permissions
source: BleepingComputer

Malwarebytes says that the focus is on stealing one-time passwords (OTP) and cryptocurrency wallet addresses, and that the malware also “builds a detailed device fingerprint.”

Another component in the malicious PWA is a service worker that is responsible for push notifications, running tasks from received payloads, and preparing stolen data locally for exfiltration.

The researchers say that the most concerning component is the WebSocket relay that allows the attacker to pass web requests through the browser as if they were on the victim’s network.

“The malware acts as an HTTP proxy, executing fetch requests with whatever method, headers, credentials, and body the attacker specifies, then returns the full response including headers” – Malwarebytes

Because the worker includes a handler for Periodic Background Sync, which allows web apps in Chromium-based browsers to periodically synchronize data in the background, the attacker can connect to a compromised device for as long as the malicious PWA app is installed.

Malware Android companion

Users who choose to activate all the security features for their account also receive an APK file for their Android devices that promises to extend protection to the list of contacts.

Fake security checks
Fake security checks
source: BleepingComputer

The payload is described as a “critical security update, ”claims to be verified by Google, and requires 33 permissions that include access to SMS texts, call logs, the microphone, contacts, and the accessibility service.

These alone are high-risk permissions that enable data theft, full device compromise, and financial fraud.

The malicious APK file includes multiple components, such as a custom keyboard to capture keystrokes, a notification listener for access to incoming notifications, and a service to intercept credentials filled automatically.

“To enhance persistence, the APK registers as a device administrator (which can complicate uninstallation), sets a boot receiver to execute on startup, and schedules alarms intended to restart components if terminated,” the researchers say.

Malwarebytes observed components that could be used for overlay-based attacks, which indicate plans for potential credential phishing in certain apps.

By combining legitimate browser features with social engineering, the attacker does not need to exploit any vulnerability. Instead, they trick the victim into providing all the needed permissions for malicious activity to occur.

The researchers warn that even if the Android APK is not installed, the web app can collect contacts, intercept one-time passwords, track location, scan internal networks, and proxy traffic through the victim’s device.

Users should be aware that Google does not run security checks through pop-ups on web pages or request any software installation for enhanced protection features. All security tools are available through the Google Account at myaccount.google.com.

To remove the malicious APK file, Malwarebytes recommends users look for a “Security Check” entry in the list of installed apps and prioritize uninstalling it.

If an app called “System Service” with a package name com.device.sync is present and has device administrator access, users should revoke it under Settings > Security > Device admin apps and then uninstall it.

Malwarebytes researchers also provide detailed steps for removing the malicious web app from both Chromium-based Windows, such as Google Chrome and Microsoft Edge, as well as from Safari.

They note that on Firefox and Safari browsers, many of the malicious app’s capabilities are severely restricted, but push notifications still work.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.



Source link