

Open your Chrome browser and click the puzzle piece icon next to the address bar. This particular piece of malware isn’t all that bothered about keeping a low profile, so finding out if you are currently infected is relatively straightforward. You can combine both methods for maximum efficiency.Chrome Shampoo extension malware: Am I infected? Also, under "Related Content" you will find links for manual removal instructions. The use of a professional anti-malware program for the removal of Cloud9 is recommended.

Be careful when planning to download software from freeware websites, as their installers can contain malicious code. These malware distribution methods highlight the importance of being vigilant while surfing the web. Other popular methods that hackers use to distribute various types of malware across the web include malicious spam (malspam) that contains fake email attachments and malicious links, and trojanized downloads.

The main distribution tactics used in these campaigns include side-loading through fake executables and malicious websites that trigger Adobe Flash Player updates. The researchers believe a group known as Keksec is behind the latest malware distribution campaign, as it uses the same command & control (C2) servers that were used by Keksec in the past. Zimperium zLabs researchers also revealed that Cloud9 botnet basically acts like a remote access Trojan (RAT) for the Chromium browser, which is the framework for Chrome, Edge, and some other browsers.

It was built with the aim to steal cookies and other information, mine cryptocurrency, install malware, or take over the entire device for use in a distributed denial-of-service (DDoS) attack. Cloud9 is a recently discovered malicious browser extension that targets the most popular browsers, including Google Chrome, Mozilla Firefox, Microsoft Edge, and Internet Explorer.Ĭloud9 allows attackers to remotely take over someone's browser session and carry out a full range of attacks.
