How cautious are you and your team with online security? You know about phishing scams, dodgy downloads, and not clicking suspicious links, right? But an even sneakier new malware (that’s malicious software) wants to frustrate you into giving up your Google login details.

The malware doesn’t have a catchy name yet, but it’s part of a larger threat known as “Amadey”, and it’s been on the rise since August.

It forces your PC into something called “kiosk mode” (a setting often used on public computers that only lets you access one window). This allows it to lock your browser in full screen mode, hiding all your usual navigation buttons like the address bar and menus. Then you get sent to a fake Google password reset page.

Normally, you’d just hit the Esc or F11 keys to get out of full screen mode, right? Well, not this time. It won’t work if the malware has infected your PC. It wants to confuse you into thinking you must enter your password to solve the problem.

The password reset page will look like a real Google page. But the second you type in your details, they’ll be stolen by a second piece of malware hiding in the background, falling right into the hands of cyber criminals.

Pretty scary stuff.

But here’s the good news: You can break free without giving up your details.

If your browser gets stuck in full screen mode, try hitting ALT+TAB to switch tasks, or ALT+F4 to force the window to close. Otherwise, try closing it through your task manager (CTRL+ALT+DELETE).

If all else fails, just restart your PC by holding down the power button or unplugging it, then get an expert (like us) to look at the malware.

Prevention is always the best approach, though. Be wary if your computer starts behaving strangely, especially if your browser suddenly goes into full screen mode and won’t let you navigate away.

Avoid clicking on suspicious links or downloading attachments you aren’t sure about. And as tempting as it might be to get past an annoying screen, never enter your password unless you’re 100% sure the website is legit.

In today’s digital landscape, malware attacks like this one are becoming more sophisticated, often capitalizing on user frustration to trick people into revealing sensitive information.

This particular malware is an example of a “social engineering” attack—a tactic where cyber criminals manipulate individuals into breaking standard security practices. By locking users into a frustrating, restrictive mode and simulating a real Google page, the malware’s creators play on people’s desire to solve the issue quickly.

The goal is to trigger a quick, unthinking response, so users are more likely to enter their login details without second-guessing the situation.

To protect yourself and your organization from threats like this, it’s essential to keep your security software up-to-date and to enable multi-factor authentication (MFA) wherever possible. MFA adds an extra layer of security by requiring an additional verification step, such as a code sent to your phone, which makes it much harder for unauthorized users to gain access to your accounts—even if they do manage to steal your password.

Educating your team on the latest cyber threats and implementing regular security training sessions can also greatly reduce the risk of falling victim to such attacks. When employees know what to look for, they’re more likely to recognize the signs of a scam before any damage is done.

Finally, as cybersecurity threats evolve, it’s vital to adopt a “zero-trust” mindset, where no link, email, or attachment is automatically trusted. Encourage a culture of healthy skepticism within your team, prompting them to question unusual requests for login information or unexpected prompts to enter sensitive details.

Remember, cybercriminals are always innovating, but by staying vigilant, reinforcing strong security practices, and taking proactive measures, you can minimize the risks and keep your data safe from threats like this frustrating malware. If you’d like us to teach your team how to avoid the latest scams, we can help. Get in touch.

Share the Post:

Join Our Newsletter