Beware This Malware: It Annoys You Into Handing Over Login Details

How vigilant are you and your team with online security? You’re likely familiar with phishing scams, suspicious links, and avoiding sketchy downloads. But a sneakier, rising threat in the malware world is banking on your frustration to steal your Google login details.

This new malware, linked to the broader Amadey malware strain, takes online threats to a new level. It’s been on the rise since August and uses a frustrating trick: trapping your PC in kiosk mode. This often-overlooked setting, generally used on public computers to restrict access, is now being used by hackers to control what you see on your screen and ultimately steal your credentials.

UK wc 4-11-24 - Tech update video thumbnail

How Does the Malware Work?

Once the malware infects your system, it initiates kiosk mode, which forces your browser into a full-screen state, blocking all usual navigation buttons like the address bar and menu options. You’re suddenly met with a screen that mimics a Google password reset page, making it look like you must enter your login details to unlock your computer.

Normally, you’d just press Esc or F11 to exit full-screen mode, but here’s the catch: the malware disables these shortcuts, trapping you on the fake page and leaving you no apparent option but to enter your details. Once you type in your password, a hidden layer of malware steals it, sending your credentials directly to cybercriminals.

How to Protect Yourself from Kiosk Mode Malware

While the malware’s tricks are alarming, there are ways to escape without handing over sensitive information. Here are the key steps to protect yourself and avoid falling for this trap:

  1. Use Task Manager to Exit – If you’re stuck in full screen, try pressing ALT+TAB to switch windows, or ALT+F4 to force-close the current window. Alternatively, open Task Manager (CTRL+ALT+DELETE) to end the application.
  2. Restart Your Device – If all else fails, restart your computer by holding down the power button or unplugging it briefly. This should close the fake login screen and any background malware processes.
  3. Stay Cautious – Be wary if your browser suddenly goes full screen and won’t let you navigate away, especially if it asks for sensitive information. Malware is often designed to confuse or frustrate you, hoping you’ll hand over your details just to escape the situation.

Preventing Malware Infections: Best Practices

Prevention is always your best line of defence against malware threats. Here are a few proactive measures:

  • Stay Vigilant with Links and Attachments – Only click links or download attachments from trusted sources. If something feels suspicious, it probably is. One of our partners, Keeper, offer more guidance on how to check if a link is safe.
  • Keep Software Updated – Ensure your operating system, antivirus software, and browser are up to date. Regular updates include security patches that protect against known vulnerabilities.
  • Implement Multi-Factor Authentication (MFA) – MFA can prevent cybercriminals from accessing your account, even if they get hold of your password. This added layer of security significantly reduces the chances of unauthorised access.
  • Train Your Team – Educating your team about these types of threats can make a big difference. If you’d like our assistance in training your staff to recognise and avoid the latest scams, we’re here to help.

Final Thoughts

Kiosk mode malware may be one of the latest tactics in cybercriminals’ arsenal, but understanding its mechanics can help you avoid falling victim. The more you know about these scams, the more empowered you are to stay safe online. Avoid getting frustrated into submission – take steps to secure your data and, when in doubt, consult a cybersecurity professional.

If your organisation needs assistance in boosting its security protocols, don’t hesitate to reach out.

Our team can provide expert guidance on keeping your systems and data safe from the latest threats. Stay cautious, stay informed, and protect your digital assets from evolving cyber risks.

Stay up to date

Sign up to our e-newsletter and get bite-sized tech tips, our latest news and industry insights.
Scroll to Top