Chrome security extension hacked to steal user data
At least five Chrome extensions have been compromised in a coordinated attack, where a threat actor successfully injected code that stole sensitive information from users.
Your browser doesn’t support HTML5 audio
At least five Chrome extensions have been compromised in a coordinated attack, where a threat actor successfully injected code that stole sensitive information from users.
This is according to cybersecurity experts at Cyberhaven. The US-based data security company warned its customers about a breach that occurred on December 24, following a successful phishing campaign targeting the company's administrator account on the Google Chrome Store.
Prominent among Cyberhaven's clients are popular brands such as Snowflake, Motorola, Canon, Reddit, AmeriHealth, Cooley, IVP, Navan, DBS, Upstart and Kirkland & Ellis.
Hackers took over employee accounts and released a malicious version (24.10.4) of the Cyberhaven extension, which included code that could steal authenticated sessions and cookies to the attacker's domain (cyberhavenext[.]pro).
Cyberhaven's internal security team removed the malware package within an hour of detection, the company said in an email to customers.
The clean version of the extension is v24.10.5 which was released on December 26. In addition to upgrading to the latest version, Cyberhaven Chrome extension users are advised to revoke non-FIDOv2 passwords, change all API tokens, and review browser logs to assess for malicious activity.
Many Chrome extensions have been hacked
Following Cyberhaven's disclosure, Nudge Security researcher Jaime Blasco conducted a deeper investigation, redirecting from the attacker's IP address and registered domain name.
According to Blasco, the malicious code that allowed the extension to receive commands from the attacker was also injected into other Chrome extensions at the same time:
- Internxt VPN – Free, Encrypted, Unlimited VPN for Secure Browsing. (10,000 users)
- VPNCity – Privacy-focused VPN with 256-bit AES encryption and global server coverage. (50,000 users)
- Uvoice – Rewards-based service to earn points through surveys and provide PC usage data. (40,000 users)
- ParrotTalks – A seamless text and note taking information search engine. (40,000 users)
- Blasco found multiple domains pointing to several other potential victims, but so far only the above extensions have been confirmed to contain malicious code.
Users of these extensions are advised to immediately remove them from their browsers or upgrade to a secure version released after December 26, after ensuring that the publisher is aware of the security issue and has fixed it.
If you are unsure, it is best to uninstall the extension, reset important account passwords, clear browser data, and reset browser settings to factory defaults.
You should read it
- 5 types of data theft you should know to prevent
- What is data exfiltration? How to prevent this dangerous behavior?
- Measures to enhance security on the iPad
- How to check your identity has been stolen yet?
- 7 mistakes make Internet security at risk
- 4 problems difficult for network security 2013
- Some basic website security rules
- Discovering more vulnerabilities makes Bluetooth devices vulnerable to malicious attacks
- Awareness and experience - the most important factor in every network security process
- 3 Chrome extensions enhance your security and safety
- The basic steps in dealing with network security issues that you need to understand
- Learn 8 online hacker training programs for only 39 USD
Maybe you are interested
Why is it lower than the sea level but there is no big lake in Turpan basin? How to Sell More Cars How to Open a Car Dealership How to Calculate Takt Time in Production Process Laziness is like a poison apple, the medicine slowly loses its thinking and limbs becomes useless: don't fix it, don't 'dream big'! 7 simple tips to increase productivity in the afternoon