Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Scams & Phishing Security Education Videos Mobile Security Your Security Education Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Hackers Flush Out Users’ Google Credentials
Facebook   X   LinkedIn   Email

Hackers Flush Out Users’ Google Credentials

June 29, 2025

Hackers have begun employing a new annoyance technique to steal Google account passwords. This tactic, called credential flushing, relies on getting malware onto a device that locks the system into “kiosk mode.” In this mode, users are prevented from doing anything else without providing their account credentials. Once the victim provides them, hackers can log into the victim’s Google account and steal personal information or further compromise their online security.

Like the technique used in the past, prompt bombing, this method also relies on user-frustration. Once the malware, StealC, makes its way onto the device, it locks into full-screen mode with the only screen the user is able to access being the Google account login screen. The user has only one-way out: Enter their login and password.

Prompt bombing involves wearing you out. They keep overwhelming the victim with multiple 2FA (two-factor authentication) prompts or pop-ups, bombarding them with repeated notifications until they unintentionally approve the login attempt.

The method also capitalizes on user frustration and fatigue. Simply, you just get tired of seeing those prompts. As a result, many people may mistakenly assume that their device is malfunctioning or that something is wrong with the system. In an effort to stop the relentless notifications, they may inadvertently click "Approve," giving attackers immediate access to their Google account.

To avoid falling victim to these techniques, users can take several precautionary measures:

  • Stay Calm: If you get locked into kiosk mode or receive a barrage of 2FA prompts, do not enter credentials or approve any requests, especially if you weren’t actively trying to log in. This could be a sign of an ongoing attack.
  • Change Your Password: If you suspect an attacker is targeting your account, change your password immediately. Go into your account on another device and go directly to the account without using a link. Make sure to use a strong, unique password for every account, and avoid reusing passwords across services.
  • Enable Stronger 2FA Options: Use more secure forms of two-factor authentication, such as hardware security keys, when possible. However, using some form of 2FA is always better than using none.
  • Review Devices Logged into Your Account: Regularly check your account for any unfamiliar devices that may have logged in, and revoke access if needed. You can find this information in your browser settings.
  • Never use your Google, or any other account credentials as your login for some other account. It might be a little more cumbersome to use separate ones for everything, but remember if one account is compromised, the others with the same credentials are at risk too.
  • Look out for phishing. Receiving unexpected links or attachments is a good sign of phishing and a good way to get malware on your device. Watch for typos, grammar mistakes, and blurry graphics too. And if you don’t know the sender, don’t click anything.

Need to get out of “kiosk” mode? Well, you can try hotkey combos of Alt + F4, Ctrl + Shift + Esc, Ctrl + Alt +Delete, and Alt +Tab on Windows devices, which could enable you to get to your desktop and launch the Task Manager. This may allow you to kill the browser. If not, there’s always the “Hail Mary” method; You can shut the machine down completely and restart it. However, you’ll need to reboot into safe mode to do a full system scan to ensure you’re not just restarting the malware.

If you need more help, consult with a technical support professional or someone you trust. And of course, always keep anti-virus software on all of your devices and keep it updated. While it won’t catch all of the malware, it will certainly catch a lot of it.


How To Create A Strong And Unique  Password For Every Account

Education

How To Create A Strong And Unique Password For Every Account

Most of us know by now not to use the same passwords for different accounts; yet some of us still do. But users who continue to use passwords they know have been exposed in a hack are truly flirting with danger. In a recent study, Google found 1.5% of passwords are still being used despite those users knowing they’ve been compromised. A security researcher discovered more than 22 million unique passwords and over 770 million email addresses were made public on a popular hacker forum earlier this year. READ FULL STORY

The Most Hacked Apps To Get To Your Details

Mobile Security

The Most Hacked Apps To Get To Your Details

We share a lot these days. Some might even say we spout personal details like a water from a fire hydrant, especially when it comes to social media. For hackers, that means they have us all right where they want us. Researchers at TechShielder put in some work and found that there are a number of apps available to us that actually have been repeatedly compromised and share our personal information with plenty of others that we may not want to have our information. READ FULL STORY

Users Not Patching MS Defender Flaw Still Risk Info-Theft

Your Security

Users Not Patching MS Defender Flaw Still Risk Info-Theft

When an organization alerts its users a patch for a security flaw is available, the smartest response is a speedy installation. Months ago, Microsoft did just that. The tech titan released a security patch for its Defender users, yet evidence shows the flaw is still being abused. That means some Defender users still haven’t applied the patch, putting them at real risk of personal data theft. Currently stealing information from users in the U.S., Spain, and Thailand, this Defender vulnerability is rated as “high severity." READ FULL STORY

Home Depot Ads Provide Unhelpful Tech Support

Scams & Phishing

Home Depot Ads Provide Unhelpful Tech Support

During quarantine, a lot of people decided they will do home improvement projects. I can attest, as I think my neighbor completely rebuilt his house over the past year; it’s a constant roar of power tools over there, every day. He’s not alone. Many people head over to Home Depot to get all of those materials to finish those do-it-yourself projects, but may want to purchase online and pickup, or just have it shipped. Easy enough to do and hackers are already on top of it. READ FULL STORY

CherryBlos-soms Bloom In April But Stink Up Your Android Device All Year

Mobile Security

CherryBlos-soms Bloom In April But Stink Up Your Android Device All Year

Summer is nearly over, but cybercriminals don't really pay much attention to the seasons. The time of year, when the Cherry trees bloom, is also a great time for cybercriminals to pollinate Android devices with malware. But as we’ve recently found out, they don’t stop when summer begins. Their devious ploys continue year-round. Researchers at Trend Micro have recently found some malware called CherryBlos being distributed as the cryptocurrency mining application, SynthNet. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...