Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Fake Google Security site uses PWA app to steal credentials, MFA codes
    Cybersecurity

    Fake Google Security site uses PWA app to steal credentials, MFA codes

    adminBy adminMarch 2, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Fake Google Security site uses PWA app to steal credentials, MFA codes
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Fake Google Security site uses PWA app to steal credentials, MFA codes

    A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time passcodes, harvesting cryptocurrency wallet addresses, and proxying attacker traffic through victims’ browsers.

    ​The attack leverages Progressive Web App (PWA) features and social engineering to deceive users into believing they are interacting with a legitimate Google Security web page and inadvertently installing the malware.

    PWAs run in the browser and can be installed from a website, just like a standalone regular application, which is displayed in its own window without any visible browser controls.

    Victim browser becomes attacker’s proxy

    The campaign relies on social engineering to obtain the necessary permissions from the user under the guise of a security check and increased protection for devices.

    The cybercriminals use the domain google-prism[.]com, which poses as a legitimate security-related service from Google, showing a four-step setup process that includes giving risky permissions and installing a malicious PWA app. In some instances, the site will also promote a companion Android app to “protect” contacts.

    According to researchers at cybersecurity company Malwarebytes, the PWA app can exfiltrate contacts, real-time GPS data, and clipboard contents.

    Additional functionality observed includes acting as a network proxy and internal port scanner, which allows the attacker to route requests through the victim’s browser and identify live hosts on the network.

    The website also requests permissions to access text and images copied to the clipboard, which can occur only when the app is open.

    Fake Google security site asking for clipboard access
    Fake Google security site asking for clipboard access
    source: BleepingComputer

    However, the fake website also asks for permission to show notifications, which allows the attacker to push alerts, new tasks, or trigger data exfiltration.

    Additionally, the malware uses the WebOTP API on supported browsers in an attempt to intercept SMS verification codes, and checks the /api/heartbeat every 30 seconds for new commands.

    As the PWA app can only steal the contents of the clipboard and OTP codes when it is open, notifications can be used to send fake security alerts that prompt the user to open the PWA again.

    Fake Google security site asks for notifications permissions
    Fake Google security site asks for notifications permissions
    source: BleepingComputer

    Malwarebytes says that the focus is on stealing one-time passwords (OTP) and cryptocurrency wallet addresses, and that the malware also “builds a detailed device fingerprint.”

    Another component in the malicious PWA is a service worker that is responsible for push notifications, running tasks from received payloads, and preparing stolen data locally for exfiltration.

    The researchers say that the most concerning component is the WebSocket relay that allows the attacker to pass web requests through the browser as if they were on the victim’s network.

    “The malware acts as an HTTP proxy, executing fetch requests with whatever method, headers, credentials, and body the attacker specifies, then returns the full response including headers” – Malwarebytes

    Because the worker includes a handler for Periodic Background Sync, which allows web apps in Chromium-based browsers to periodically synchronize data in the background, the attacker can connect to a compromised device for as long as the malicious PWA app is installed.

    Malware Android companion

    Users who choose to activate all the security features for their account also receive an APK file for their Android devices that promises to extend protection to the list of contacts.

    Fake security checks
    Fake security checks
    source: BleepingComputer

    The payload is described as a “critical security update, ”claims to be verified by Google, and requires 33 permissions that include access to SMS texts, call logs, the microphone, contacts, and the accessibility service.

    These alone are high-risk permissions that enable data theft, full device compromise, and financial fraud.

    The malicious APK file includes multiple components, such as a custom keyboard to capture keystrokes, a notification listener for access to incoming notifications, and a service to intercept credentials filled automatically.

    “To enhance persistence, the APK registers as a device administrator (which can complicate uninstallation), sets a boot receiver to execute on startup, and schedules alarms intended to restart components if terminated,” the researchers say.

    Malwarebytes observed components that could be used for overlay-based attacks, which indicate plans for potential credential phishing in certain apps.

    By combining legitimate browser features with social engineering, the attacker does not need to exploit any vulnerability. Instead, they trick the victim into providing all the needed permissions for malicious activity to occur.

    The researchers warn that even if the Android APK is not installed, the web app can collect contacts, intercept one-time passwords, track location, scan internal networks, and proxy traffic through the victim’s device.

    Users should be aware that Google does not run security checks through pop-ups on web pages or request any software installation for enhanced protection features. All security tools are available through the Google Account at myaccount.google.com.

    To remove the malicious APK file, Malwarebytes recommends users look for a “Security Check” entry in the list of installed apps and prioritize uninstalling it.

    If an app called “System Service” with a package name com.device.sync is present and has device administrator access, users should revoke it under Settings > Security > Device admin apps and then uninstall it.

    Malwarebytes researchers also provide detailed steps for removing the malicious web app from both Chromium-based Windows, such as Google Chrome and Microsoft Edge, as well as from Safari.

    They note that on Firefox and Safari browsers, many of the malicious app’s capabilities are severely restricted, but push notifications still work.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    app codes Credentials Fake Google MFA PWA Security Site steal
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAI marketing predictions that will shape 2026
    Next Article Why I’m sticking with 7B models for my local dev environment (and you should too)
    admin
    • Website

    Related Posts

    That screenless Google band on Stephen Curry’s wrist may finally have a name

    April 20, 2026

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Here’s How Netflix Plans to Add TikTok-Style Videos to Its Mobile App

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    That screenless Google band on Stephen Curry’s wrist may finally have a name

    April 20, 2026

    Starbucks’ New ChatGPT Integration Is a Potential Privacy Nightmare

    April 20, 2026

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,403)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,688)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    That screenless Google band on Stephen Curry’s wrist may finally have a name

    April 20, 2026

    Starbucks’ New ChatGPT Integration Is a Potential Privacy Nightmare

    April 20, 2026

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026
    Most Popular
    • That screenless Google band on Stephen Curry’s wrist may finally have a name
    • Starbucks’ New ChatGPT Integration Is a Potential Privacy Nightmare
    • I replaced my entire streaming setup with a $30 device and free apps
    • Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games
    • The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon
    • The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners
    • Monitor spec sheets hide the one thing that actually decides whether a display feels premium
    • Apple account change alerts abused to send phishing emails
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.