Connect with us

Technology

ChromeLoader Malware Campaign Punishes Pirating Users, HP Warns

HP

New report finds attackers hiding malware in OneNote documents, while threat actors use trusted domains to bypass Office macro controls

HP Inc. (NYSE: HPQ) issued its quarterly HP Wolf Security Threat Insights Report, showing threat actors are hijacking users’ Chrome browsers if they try to download popular movies or video games from pirating websites.

By isolating threats that have evaded detection tools on PCs, HP Wolf Security has specific1 insight into the latest techniques being used by cybercriminals in the fast-changing cybercrime landscape. To date, HP Wolf Security customers have clicked on over 30 billion email attachments, web pages, and downloaded files with no reported breaches.

Based on data from millions of endpoints running HP Wolf Security2, the researchers found:

  • The Shampoo Chrome extension is hard to wash out: A campaign distributing the ChromeLoader malware tricks users into installing a malicious Chrome extension called Shampoo. It can redirect the victim’s search queries to malicious websites, or pages that will earn the criminal group money through ad campaigns. The malware is highly persistent, using Task Scheduler to re-launch itself every 50 minutes.
  • Attackers bypass macro policies by using trusted domains: While macros from untrusted sources are now disabled, HP saw attackers bypass these controls by compromising a trusted Office 365 account, setting up a new company email, and distributing a malicious excel file that infects victims with the Formbook infostealer.
  • Firms must beware of what lurks beneath: OneNote documents can act as digital scrapbooks, so any file can be attached within. Attackers are taking advantage of this to embed malicious files behind fake “click here” icons. Clicking the fake icon opens the hidden file, executing malware to give attackers access to the users’ machine – this access can then be sold on to other cybercriminal groups and ransomware gangs.

Sophisticated groups like Qakbot and IcedID first embedded malware into OneNote files in January. With OneNote kits now available on cybercrime marketplaces and requiring little technical skill to use, their malware campaigns look set to continue over the coming months.

“To protect against the latest threats, we advise that users and businesses avoid downloading materials from untrusted sites, particularly pirating sites. Employees should be wary of suspicious internal documents and check with the sender before opening. Organizations should also configure email gateway and security tool policies to block OneNote files from unknown external sources,” explains Patrick Schläpfer, Malware Analyst at the HP Wolf Security threat research team, HP Inc.

From malicious archive files to HTML smuggling, the report also shows cybercrime groups continue to diversify attack methods to bypass email gateways, as threat actors move away from Office formats. Key findings include:

  • Archives were the most popular malware delivery type (42%) for the fourth quarter running when examining threats stopped by HP Wolf Security in Q1.
  • There was a 37-percentage-point rise in HTML smuggling threats in Q1 versus Q4.
  • There was a 4-point rise in PDF threats in Q1 versus Q4.
  • There was a 6-point drop in Excel malware (19% to 13%) in Q1 versus Q4, as the format has become more difficult to run macros in.
  • 14% of email threats identified by HP Sure Click bypassed one or more email gateway scanner in Q1 2023.
  • The top threat vector in Q1 was email (80%) followed by browser downloads (13%).

“To protect against increasingly varied attacks, organizations must follow zero trust principles to isolate and contain risky activities such as opening email attachments, clicking on links, or browser downloads. This greatly reduces the attack surface along with the risk of a breach,” comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc.

HP Wolf Security runs risky tasks like opening email attachments, downloading files and clicking links in isolated, micro-virtual machines (micro-VMs) to protect users. It also captures detailed traces of attempted infections. HP’s application isolation technology mitigates threats that might slip past other security tools and provides unique insights into novel intrusion techniques and threat actor behavior.

About the data

This data was anonymously gathered within HP Wolf Security customer virtual machines from January-March 2023.

About HP

HP Inc. (NYSE: HPQ) is a global technology leader and creator of solutions that enable people to bring their ideas to life and connect to the things that matter most. Operating in more than 170 countries, HP delivers a wide range of innovative and sustainable devices, services and subscriptions for personal computing, printing, 3D printing, hybrid work, gaming, and more. For more information, please visit: http://www.hp.com.

About HP Wolf Security

HP Wolf Security is a new breed of endpoint security. HP’s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services. Visit https://www.hp.com/uk-en/security/endpoint-security-solutions.html.

Source – HP
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Trending

Elon Musk Elon Musk
Profile1 month ago

Elon Musk: Business Leader Behind Tesla, SpaceX, and xAI

Quick Facts Field Details Full Name Elon Reeve Musk Born June 28, 1971 Birthplace Pretoria, South Africa Nationality South African,...

Travel1 month ago

Best Places to Visit in Vietnam – Complete Travel Guide

Vietnam is one of the most rewarding destinations in Southeast Asia. It’s a country where emerald bays meet towering limestone...

Best iPhones to Buy in 2026 Best iPhones to Buy in 2026
Technology2 months ago

Best iPhones to Buy in 2026: Top 7 Models Compared with Features, Prices, and Expert Advice

Choosing the best iPhone to buy in 2026 is not simply about picking the newest release. With several generations still...

gold and silver gold and silver
Finance2 months ago

Why Gold and Silver Are Rising: What’s Driving Precious Metals’ Strong Momentum

Gold and silver are gaining strength as investors seek safe-haven assets amid global economic and geopolitical uncertainty. Silver is outperforming...

Best Hospitals in India for Heart Surgery Best Hospitals in India for Heart Surgery
Health2 months ago

Best Hospitals in India for Heart Surgery – Top Cardiac Care Centers in 2026

Heart disease is a significant health challenge in India and worldwide. With rising incidence of coronary artery disease, heart attacks,...

Best Airline Loyalty Programs 2026 Best Airline Loyalty Programs 2026
Travel2 months ago

Best Airline Loyalty Programs in 2026: Which Frequent Flyer Programs Are Really Worth It?

Spend enough time in airports and you’ll notice something interesting. Some travelers move effortlessly — priority check-in, lounge access, early...

Best Medical Schools in the US Best Medical Schools in the US
Education2 months ago

Best Medical Schools in the US in 2026: A Complete and Easy Guide for Future Doctors

Choosing from the best medical schools in the US is one of the most important decisions in a future doctor’s...

Cars Below 15 Lakhs in India Cars Below 15 Lakhs in India
Auto2 months ago

Cars Below 15 Lakhs in India: The Complete Buyer’s Guide for 2026

The Indian automobile market in 2026 has entered a value-driven era. Buyers no longer need to exceed their budget to...

Cuisine of the Middle East Cuisine of the Middle East
Food and Beverage2 months ago

Cuisine of the Middle East: Flavours That Carry History on Every Plate

There’s a reason people speak of the cuisine of the Middle East with a certain reverence. It isn’t simply about...

Credit Card With Benefits Best Credit Card With Benefits Best
Finance2 months ago

Credit Card With Benefits Best: How to Maximize Value

Credit cards have become part of everyday life — from paying utility bills to booking travel online. But today, a...

Translate »