This article has been created in order to help you by explaining to you how to remove the Google Critical Security Alert scam which can be encountered on your Gmail.
Update November 2019. The Google Critical Security Alert is a good system designed by google which is used to notify you every time there is a new login on your account from a new device. It can often confuse people who are using new devices to log in from, like their phone or even if they use a VPN or a proxy service to access Gmail securely. However, reports have started to add up that there is a fake message, which is the same as the original Google Critical Security Alert scam and this fake message may contain a virus after the victim clicks on Its button to check if their account is secure. If you are not sure whether the Google Critical Security Alert message is actual we recommend that you read this article in order to learn how to remove the Google Critical Security Alert from your computer.
Subnote: This post was originally created in May 2018, but we gave it an update in November 2019.
|Name||Google Critical Security Alert|
|Type||Scam / Malware|
|Short Description||Aims to trick victims to be redirected to a third-party web link which can infect their computer|
|Symptoms||A message, claiming the computer of the victim has been compromised.|
|Distribution Method||Via e-mail messages that imitate the original Gmail Critical Security Alert, claiming that the a new and unfamiliar device has logged in to your Google account.|
|Detection Tool|| See If Your System Has Been Affected by Google Critical Security Alert |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Google Critical Security Alert.|
Google Critical Security Alert Scam – Update November 2019
Google Critical Security Alert Scam – Update September 2019
The Google Critical Security Alert Scam has begun to change a bit and diversify the phishing methods it uses to infect computers and hijack passwords. One of its new phishing attempts that were recently detected could appear like the following:
Be very careful, because the scam targets Windows as well as Mac devices, so if you spot such or similar notifications, always make sure that they are from google and not a spoofed e-mail address.
Google Critical Security Alert Sign-In Attempt Was Blocked – Update January 2019
The Google Critical Security alert has also been seen in a massive spam outbreak via Gmail. The alert messages appear like the image we have received from Twitter reports:
Above you can see the Google Sign in attempt was Blocked message that has been plaguing more and more people.
Users should be aware not to trust the fake Google Critical Security alert messages, since opening files attached or URLs that are linked as hyperlinks there may lead to a dangerous malware infection.
Google Critical Security Alert Scam – Update November 2018
A second smaller campaign that is related to the Google Critical Security Alert Scam is a pop-up message or graphics image that can be distributed using various methods:
- Phishing Emails
- Web Redirects
- Virus Infections
The message will display an URL and a counterfeit Google alert warning the victims that their Gmail accounts have been accessed. A password reset link is showed which will open a fake login page. Any entered account credentials will be stolen by the operators.
A sample scam text reads the following:
Critical security alert A suspicious app was blocked from accessing your account ………..@—.com Google prevented someone from signing in to your account using a non-Google app. If this wasn’t you, they know your password and you should change it… http://184.108.40.206/
Critical Security Alert from Google – Update August 2018
New information has come to light concerning the scam Critical Security Alert from Google. It appears that the e-mails have started to spread with an increased rate and the new e-mail form has been modified to say the following:
“Someone just used your passowrd to try and sign in to your account. Google blocked them, but you should check what happened”
someone just used your password to try to sign in to your account from a non-google app. google blocked them, but you should check what happened. review your account activity to make sure no one else has access.
In seems that the e-mails now lead to a web link where the crooks may attempt to trick victims into entering their personal information. The scam, which was first detected by Wordfence seems to have come back and despite the fact that Google Chrome has resolved this issue, users still report it as a virus. One particular report has been detected in association with a scam that asks users to click on a link that is not the original sign in web link for their accounts, which is https://myactivity.google.com/. If you see any other URL besides this fake URL, we advise you not to enter your username and password. And if you encounter such e-mail, we do recommend that you immediately contact us via our support e-mail or via writing a comment in the comment section below.
Google Critical Security Alert Malware – How Does It Spread
The main method which is used by the Google Critical Security Alert scam is to send phishing e-mails to the victim’s e-mail account which are the same as the original Google e-mails that a new device has logged into your computer. The message being used by it may appear like the following:
The message also says that a sign-in attempt was blocked on your e-mail address and may contain a sub-message saying “Someone just used your password to try to sign in to your account. Google blocked them, but you should check what happened”.
While many of those messages may be actual, the Google “Critical security alert” scam may appear without you having to log in as a new device, which is the strongest indicator.
Google “Critical Security Alert” – More Information
The Critical Security Alert message may come directly into your Gmail and after you click on the button it wants you to, you have successfully fallen into it’s trap, it may download it’s payload files directly onto your computer. These files may be of different file types:
→ .exe, .dll, .tmp, .vbs, .js, .bat, .cmd, .reg
The files may be located under different names in the following Windows directories:
After the files are dropped onto your computer, the Google “Critical Security Alert” “virus” may perform series of modifications that give it privileges to perform different administrative activities. Such activities are likely to:
- Create mutexes.
- Touch system files of Windows.
- Create registry entries in different administrative sub-keys.
- Create scheduled tasks on your PC.
This may ultimately result in the Google Security Alert malware to be able to steal information directly from your computer and perform series of malicious activities, like:
- Install copies of itself in case you remove it’s payload manually.
- Update itself to remain hidden on your PC.
- Take screenshots of your desktop.
- Log your keystrokes.
- Scan for and steal saved passwords on your drive and web browser.
- Steal files by copying them and silently sending them to the cyber-criminals via unsecured ports.
- Download malware and adware on your computer without your consent or knowledge.
Remove “Critical Security Alert” Scam from Your Computer
In order to make sure that the “Critical Security Alert” scam is fully gone from your computer, we recommend that you follow the removal instructions underneath this article. They have been divided in manual and automatic removal manuals so that they can help you delete this threat based on your malware removal experience. If manual removal is not exactly something that you feel confident in doing, recommendations are to remove this malware or check if it has your infected your computer automatically by downloading and scanning your computer via an advanced anti-malware program. Such software will effectively make sure that your PC is fully secured and you passwords and data remain safe in the future.