FBI Alerts Chrome Users: Avoid Installing These Updates
In today's digital age, Google's Chrome browser continues to dominate as the most commonly used browser on Windows PCs. However, its widespread popularity makes it an attractive target for cybercriminals, with fake Chrome installations and updates posing a significant threat.
To ensure a secure and uninterrupted browsing experience, it's essential to follow some key steps when updating Google Chrome on Windows PCs.
**1. Use the Official Chrome Update Method**
When updating Chrome, always use the official method to avoid unofficial updates and potential security threats. To do this, open Chrome and click the three-dot menu in the upper-right corner. Navigate to *Settings* > *About Chrome*. Chrome will automatically check for updates, download the latest official version, and prompt you to restart the browser to apply the update.
**2. Download Only From Official Sources**
If reinstalling or manually updating Chrome, always download the installer from the official Google Chrome website (https://www.google.com/chrome) to avoid malicious or tampered software.
**3. Keep Windows Updated**
Ensure Windows system updates are current by going to *Start* > *Settings* > *Windows Update* to apply any pending patches, which can improve browser compatibility and security.
**4. Avoid Third-Party or Pirated Versions**
Do not download Chrome updates from unofficial channels, software aggregates, or unknown websites, as these can include malware or backdoors.
**5. Regularly Check Chrome Version**
Regularly verify your installed Chrome version matches the latest official release (e.g., as of early July 2025, patched versions are 138.0.7204.96/97 on Windows).
By following these steps, you minimize risks associated with unofficial updates and potential browser security vulnerabilities. If issues arise after system updates, consider Windows recovery options or contacting support to ensure Chrome remains functional and secure.
The FBI has issued a warning about fake Chrome updates as a critical threat, with the primary method of initial entry for Interlock ransomware attacks being unofficial Chrome updates. This RAT drops a file into the Windows Startup folder, which is designed to run the RAT every time the victim logs in.
To combat this, users should avoid clicking on links sent in emails or messages that claim to provide updates or fresh installations of Chrome. Additionally, avoiding ClickFix, a method of attack that instructs you to paste text into a Windows command and then execute that script, is also important.
The advisory urges organizations to train users to spot social engineering attempts. The FBI and CISA have published a new advisory about the surge in Interlock ransomware attacks, warning that the fake Google Chrome browser executable functions as a remote access trojan (RAT) designed to execute a PowerShell script.
Microsoft has been trying to push users towards its Edge browser, but Chrome still dominates. Given Google's latest set of high-severity fixes, users are urged to update Chrome as soon as possible to maintain a secure browsing environment.
In the event of vague warnings about possible Google or Chrome attacks, it's crucial to be cautious and only download updates from the official Google Chrome website. Furthermore, in light of the FBI's warnings about the Interlock ransomware's primary entry point being unofficial Chrome updates, regular cybersecurity awareness training to spot social engineering attempts becomes essential in maintaining a secure technology environment.