Hackers Hijacked Chrome Extensions to Inject Malicious Code



Introduction

In recent cybersecurity news, hackers have infiltrated Chrome extensions, compromising over 600,000 users. A sophisticated attack targeted at least 16 popular extensions has raised alarms regarding the vulnerability of browser extensions, which are often trusted yet can be exploited for data theft. The attack was discovered in late December 2024 and is linked to a broader phishing campaign that gave cybercriminals access to developers' accounts on the Chrome Web Store. These breaches highlight the growing threat to users' sensitive data and privacy through seemingly harmless browser add-ons.

Understanding the Attack on Chrome Extensions

Cybercriminals employed a well-crafted phishing campaign to compromise several well-known Chrome extensions, which are small programs that enhance the functionality of the browser. The attackers targeted developers of these extensions, using phishing emails to trick them into giving up their credentials. With this access, they were able to inject malicious code into legitimate extensions, which were then made available on the Chrome Web Store.

The Scope of the Breach

The cyberattack affected over 600,000 users worldwide, with the compromised extensions stealing sensitive data such as cookies and access tokens. The attack primarily targeted business accounts, particularly those linked to social media advertising platforms and AI tools. The first known victim was Cyberhaven, a data protection firm based in California. On Christmas Eve 2024, one of their employees was tricked into clicking a malicious link that granted hackers access to their developer account.

How the Hackers Gained Access

The attack began with a phishing email that appeared to come from the Chrome Web Store Developer Support team. The email claimed that an extension was at risk of being removed due to a policy violation, urging the recipient to click a link to resolve the issue. This link redirected the developer to a fake page that prompted them to authorize a malicious OAuth application named “Privacy Policy Extension.” Once the permissions were granted, the attackers gained control and uploaded a version of the Cyberhaven extension with malicious code.

Malicious Code and Its Impact

Once published, the compromised extensions communicated with a remote server controlled by the hackers. This server was responsible for receiving and transmitting stolen data, such as cookies and user session tokens. The malicious code was designed to exfiltrate sensitive information and send it back to the cybercriminals, giving them access to Facebook business accounts, AI platforms, and other valuable targets.

The Extent of Affected Extensions

While Cyberhaven was the first to discover the breach, further investigation revealed that other popular Chrome extensions had also been compromised. These included AI-related extensions like “AI Assistant – ChatGPT and Gemini for Chrome” and “Bard AI Chat Extension,” VPN tools such as “VPNCity” and “Internxt VPN,” and productivity extensions like “VidHelper Video Downloader” and “Reader Mode.” These extensions spanned multiple categories, showing that the attack was both opportunistic and widespread.

Timeline of the Attack

The malicious code was active for approximately 25 hours, from December 24 to December 26, 2024. During this period, any Chrome installations that automatically updated their extensions were vulnerable to the attack. Cyberhaven detected the breach on Christmas Day and quickly removed the malicious extension

the permissions granted to extensions are often broad, allowing them to operate without strict oversight. This makes them a prime target for hackers who exploit these permissions to infiltrate systems and steal sensitive data.

The Role of Google in Addressing the Issue

Once Cyberhaven detected the malicious extension and removed it, Google took swift action. However, security experts emphasize that the presence of the compromised extension on user devices for 24 hours poses a significant risk. Even after the extension was removed from the Chrome Web Store, users who had already updated their browsers with the compromised extension remained vulnerable to continued data exfiltration. This highlights the challenges of securing browser extensions once they have been published and downloaded by users.

Why Was Cyberhaven Targeted?

Cyberhaven’s extension was likely targeted due to the nature of the company’s business. As a data protection company, it provides services to businesses that store and process sensitive information. This made it an appealing target for cybercriminals seeking access to corporate accounts, especially in the advertising and AI industries. The attackers were able to steal user credentials, which could then be used for malicious activities, such as unauthorized access to social media accounts or data manipulation.

The Broader Campaign: Multiple Extensions Affected

As cybersecurity experts continued their investigations, more extensions were discovered to be part of the same attack campaign. The malware was injected into a wide range of extensions across different categories. These included productivity tools, video downloaders, AI assistants, and even extensions offering cashback deals. The broad selection of affected extensions indicates that the attackers were casting a wide net, hoping to maximize the number of compromised users.

How Users Can Protect Themselves

In the wake of the breach, users are advised to take immediate steps to protect their data. This includes updating Chrome extensions to the latest versions, reviewing installed extensions to ensure they are from reputable sources, and being cautious about granting permissions to new or unfamiliar extensions. Users should also rotate passwords, particularly for accounts linked to social media or business platforms, and monitor their activity for any signs of suspicious behavior.

The Importance of Regular Updates and Vetting Extensions

This breach underscores the importance of regularly updating browser extensions and vetting their sources. While the Chrome Web Store conducts security reviews for new extensions, these measures are not foolproof. Developers must implement strong security practices, including periodic code audits, and ensure that they are using multi-factor authentication and other protective measures to safeguard their developer accounts.

Lessons for Extension Developers and Users

For extension developers, this attack serves as a wake-up call to prioritize security in their code and in the permissions they request. They must be vigilant against phishing attempts and implement safeguards to prevent unauthorized access to their accounts. For users, the attack highlights the need for greater caution when installing or updating extensions. It's crucial to scrutinize the permissions requested by extensions and avoid installing those that ask for unnecessary access to sensitive data.

Conclusion: A Wake-Up Call for Browser Security

This attack serves as a critical reminder of the vulnerabilities associated with browser extensions. While these tools enhance our browsing experience, they also present significant security risks if not properly managed. Both users and developers must adopt a more proactive approach to extension security, ensuring that they are continually updated, carefully monitored, and sourced from reputable developers. The Cyberhaven breach, and the subsequent exposure of other extensions, should serve as a catalyst for broader industry discussions on how to better secure browser extensions against evolving cyber threats.

FAQs

1. How do hackers compromise Chrome extensions?
Hackers often use phishing campaigns to gain access to developers' accounts on the Chrome Web Store. Once inside, they can inject malicious code into legitimate extensions, which is then distributed to users.

2. How can I tell if my Chrome extension has been compromised?
Check for unusual behavior in your browser, such as slow performance, unexpected pop-ups, or unauthorized actions in your online accounts. Ensure that all extensions are updated to the latest version, and uninstall any suspicious ones.

3. What should I do if my account has been compromised through a malicious extension?
Immediately update your passwords, enable multi-factor authentication, and review your account activity for any signs of suspicious behavior. It's also important to remove the compromised extension and report it to the appropriate authorities.

4. Are all Chrome extensions vulnerable to this kind of attack?
While most extensions are safe, any extension that requires extensive permissions, such as access to cookies or identity information, can be vulnerable if compromised. Always install extensions from trusted sources and carefully review the permissions they request.

5. Can Google prevent these types of attacks?
Google has taken steps to secure the Chrome Web Store by conducting security reviews for extensions. However, this attack shows that more comprehensive measures are needed, such as better monitoring for suspicious developer activity and improved extension vetting.

Source: Google News

Read more blogs: Alitech Blog

www.hostingbyalitech.com

www.patriotsengineering.com

www.engineer.org.pk

Tags : Chrome extension security, malicious code in Chrome extensions, phishing attack Chrome extensions, data theft from Chrome extensions, compromised browser extensions, Cyberhaven security breach, protecting browser extensions, Chrome Web Store phishing attack, security risks browser extensions, hackers hijack Chrome extensions, Chrome extension data exposure, securing Chrome extensions, preventing extension vulnerabilities, malicious extensions data theft, cybersecurity browser extensions

Posted in News on Dec 30, 2024



Galaxy S10 Phones Bricked by Recent Update, Samsung Quickly Offers a Fix

Posted on Oct 04, 2024

The recent Samsung update has caused severe problems for many Galaxy S10 and Note 10 owners, leaving their devices bricked and forcing users to seek urgent solutions. The update, designed to improve functionality, has instead resulted in a widespread issue that has thrown affected phones into an endless boot loop. Fortunately, Samsung was quick to respond with a fix, but users are still grappling with the impact.



How an App on Your Smartwatch Could Help You Quit Smoking

Posted in News on Jan 02, 2025

Researchers at the University of Bristol have developed an innovative app for Android smartwatches to help smokers quit. The app detects specific hand movements associated with smoking and delivers supportive messages to the user, providing a gentle nudge to avoid lighting up



Google Search Impact - Congrats on reaching 900 clicks in 28 days!

Posted in News on Mar 05, 2022

Google Search Impact - Congrats 900 clicks 28 days! - Awesome



Top Best Web Hosting Services of 2024

Posted in About Hosting by AliTech, News on Sep 02, 2024

Find the best web hosting service for your website in 2024! Compare top hosting providers like HostGator, Bluehost, and DreamHost, and discover the benefits of cloud-powered hosting with Hosting by AliTech. Limited time offer: Get up to 33.3% off your hosting plan with Hosting by AliTech!



Ghost Framework: A Comprehensive Guide

Posted in Uncategorized on Sep 11, 2024

Ghost Framework is a powerful and flexible PHP framework designed for building robust and scalable web applications. With its modular design and MVC architecture, Ghost Framework enables developers to build applications in a structured and organized way. In this comprehensive guide, we'll explore the features and benefits of Ghost Framework, and provide a step-by-step tutorial on getting started with the framework. Whether you're a seasoned PHP developer or just starting out, Ghost Framework is an ideal choice for building fast, secure, and reliable web applications



Intel CEO Pat Gelsinger's Dramatic Exit: A Tech Industry Watershed Moment

Posted in News on Dec 03, 2024

Intel CEO Pat Gelsinger abruptly resigned on December 1, 2024, after a challenging three-year tenure. His departure follows the company's dramatic decline, with Intel's stock falling 61% and losing ground to AI-focused competitors like Nvidia. The company has appointed interim co-CEOs while searching for a permanent replacement, marking a critical moment in Intel's struggle to remain competitive in the rapidly evolving semiconductor industry.



The Future of AI and Cloud Computing: A Global Perspective

Posted on Oct 03, 2024

Cloud computing and artificial intelligence (AI) are transforming the technological landscape at an unprecedented pace. These two forces have become vital for businesses aiming to scale, innovate, and stay competitive in a digital-first world. As major corporations like Microsoft, Google, and Oracle make significant investments in cloud infrastructure and AI capabilities, it's clear that these technologies will shape the future of industries worldwide. In this article, we'll dive deep into the latest developments in AI and cloud computing, with a focus on global investments, emerging technologies, and the impact on businesses across different regions.



Low Cost Web Hosting with Advance Features

Posted in Hosting Promotions on Jan 28, 2021

HostingbyAliTech is providing you an amazing advance features at a low cost. The features, which are much expensively available in the web hosting industry.



Google’s $2.7 Billion Move to Rehire AI Genius: Noam Shazeer's Return to the Search Giant

Posted in News on Sep 26, 2024

In the rapidly evolving landscape of Artificial Intelligence, Noam Shazeer's return to Google in a staggering $2.7 billion deal marks a significant turning point. Once a key player at Google, Shazeer left in frustration over the company's cautious approach to AI innovation. He co-founded Character.AI, which achieved remarkable success in creating conversational agents. However, as competition in AI intensified, Google recognized the value of Shazeer's expertise and technology, leading to a strategic acquisition aimed at revitalizing its AI capabilities. His role in developing Gemini, Google’s next-gen AI model, could redefine the company's position in the fiercely competitive AI market.



Ubuntu 18.04.6 LTS (Bionic Beaver) / Ubuntu 20.04.3 LTS (Focal Fossa) - Common Commands

Posted in Technical Solutions on Nov 04, 2021

Ubuntu 18.04.6 LTS (Bionic Beaver) / Ubuntu 20.04.3 LTS (Focal Fossa) - Common Commands & Frequent Tasks Disabling the firewall - iptables if you need to disable the firewall temporarily, you can flush all the rules using



[SOLVED / FIXED] DataError: (1406, "Data too long for column 'name' at row 1")

Posted in Technical Solutions on Sep 14, 2022

DataError: (1406, "Data too long for column 'name' at row 1") Error: DataError: (1406, "Data too long for column 'name' at row 1") Problem Statement: When creating a Slug in Django Model with Slugify this error populates. Solution:



OpenAI Just Announced New AI Features: Key Takeaways from DevDay

Posted in News on Oct 02, 2024

OpenAI has once again made headlines with a series of groundbreaking announcements at its recent developer event, DevDay. These updates promise to change the way developers and entrepreneurs build AI-powered products. Whether you're working on a new voice assistant or simply trying to optimize API usage, these new features will play a pivotal role in enhancing the performance and accessibility of AI technologies. In this article, we’ll break down everything you need to know about the new tools and capabilities OpenAI announced. From AI voice assistants to cutting-edge API updates, these innovations are setting the stage for the future of AI.



Google Imagen 3 is Now Available for All Gemini Users

Posted in News on Oct 11, 2024

Google has once again pushed the boundaries of artificial intelligence with the release of Imagen 3, its most advanced image generation model to date. This powerful tool, now available to all users of Gemini, promises to revolutionize how we interact with AI-generated imagery by offering unmatched photorealism, vibrant colors, and enhanced control over prompts. But what exactly makes Imagen 3 stand out? Let's dive into all the exciting details of this cutting-edge technology



The Role of Artificial Intelligence in Hollywood: Ben Affleck’s Perspective

Posted in News on Nov 26, 2024

Ben Affleck, the renowned actor and director, shared his perspective on artificial intelligence's role in Hollywood, emphasizing that AI can streamline laborious tasks but cannot replace human creativity. Speaking at CNBC’s Delivering Alpha 2024 summit, Affleck highlighted AI's limitations in originality and its inability to replicate the emotional depth achieved through human interaction. While optimistic about AI reducing filmmaking costs and democratizing the industry, he stressed its role as a tool, not a creator. Affleck’s nuanced insights provide a balanced view of AI as a complement to human creativity rather than a replacement.



Meet Autumn 2024 Alibaba Cloud MVPs: A Spotlight on Farhan Ali Shah

Posted in News on Oct 01, 2024

The Autumn 2024 Alibaba Cloud MVP Program proudly welcomes a group of talented professionals, including Farhan Ali Shah, Director at AliTech Solutions. This article highlights their achievements and contributions to the cloud computing community. Alibaba Cloud MVPs are recognized for their expertise and commitment to sharing knowledge, playing a crucial role in driving digital transformation and innovation. Join us as we celebrate these leaders who are shaping the future of technology through their dedication and passion for cloud solutions.



[SOLVED / FIXED] mysqlclient ERROR: Command errored out with exit status 1: python setup.py egg_info Check the logs for full command output.

Posted on Jun 09, 2022

[SOLVED / FIXED] mysqlclient ERROR: Command errored out with exit status 1: python setup.py egg_info Check the logs for full command output.



Install Django on CyberPanel and Openlitespeed with WSGI

Posted in Technical Solutions on Feb 02, 2021

Install Django on CyberPanel and Openlitespeed with WSGI These links were of help but I had to struggle alot to reach to success which changes have been included in these guides:



The Ultimate Guide to Top Web Hosting Features in 2024

Posted in Uncategorized on Sep 19, 2024

In 2024, web hosting is about more than just storing your website; it's about providing a solid foundation for online success. To achieve this, consider key features such as speed and performance, security, scalability, and reliability. A fast website is crucial, with SSD storage, LiteSpeed or Nginx servers, and Content Delivery Networks (CDNs) playing vital roles. Security measures like SSL certificates, regular backups, and firewalls are also essential. Scalability options, user-friendly control panels, and reliable customer support further enhance your hosting experience.




Other Blogs


Galaxy S10 Phones Bricked by Recent Update, Samsung Quickly Offers a Fix

Posted on Oct 04, 2024 and updated on Oct 04, 2024

How an App on Your Smartwatch Could Help You Quit Smoking

Posted in News on Jan 02, 2025 and updated on Jan 02, 2025

Google Search Impact - Congrats on reaching 900 clicks in 28 days!

Posted in News on Mar 05, 2022 and updated on Mar 18, 2022

Top Best Web Hosting Services of 2024

Posted in About Hosting by AliTech, News on Sep 02, 2024 and updated on Sep 02, 2024

Ghost Framework: A Comprehensive Guide

Posted in Uncategorized on Sep 11, 2024 and updated on Sep 11, 2024

Intel CEO Pat Gelsinger's Dramatic Exit: A Tech Industry Watershed Moment

Posted in News on Dec 03, 2024 and updated on Dec 03, 2024

The Future of AI and Cloud Computing: A Global Perspective

Posted on Oct 03, 2024 and updated on Oct 03, 2024

Low Cost Web Hosting with Advance Features

Posted in Hosting Promotions on Jan 28, 2021 and updated on Mar 30, 2022

OpenAI Just Announced New AI Features: Key Takeaways from DevDay

Posted in News on Oct 02, 2024 and updated on Oct 02, 2024

Google Imagen 3 is Now Available for All Gemini Users

Posted in News on Oct 11, 2024 and updated on Oct 11, 2024

The Role of Artificial Intelligence in Hollywood: Ben Affleck’s Perspective

Posted in News on Nov 26, 2024 and updated on Nov 26, 2024

Meet Autumn 2024 Alibaba Cloud MVPs: A Spotlight on Farhan Ali Shah

Posted in News on Oct 01, 2024 and updated on Oct 01, 2024

Install Django on CyberPanel and Openlitespeed with WSGI

Posted in Technical Solutions on Feb 02, 2021 and updated on Aug 26, 2022

The Ultimate Guide to Top Web Hosting Features in 2024

Posted in Uncategorized on Sep 19, 2024 and updated on Sep 19, 2024







Comments

Please sign in to comment!






Subscribe To Our Newsletter

Stay in touch with us to get latest news and discount coupons