Skip to content
Tech News
← Back to articles

Over 100 Chrome extensions in Web Store target users accounts and data

read original get Chrome Extension Security Bundle → more articles
Why This Matters

The discovery of over 100 malicious Chrome extensions targeting user accounts and data highlights significant security vulnerabilities in the Chrome Web Store. This campaign, linked to a Russian MaaS operation, underscores the growing sophistication of cyber threats aimed at exploiting browser extensions for data theft, account hijacking, and monetization. For consumers and the tech industry, it emphasizes the urgent need for improved vetting processes and user awareness to prevent widespread exploitation.

Key Takeaways

More than 100 malicious extensions in the official Chrome Web Store are attempting to steal Google OAuth2 Bearer tokens, deploy backdoors, and carry out ad fraud.

Researchers at application security company Socket discovered that the malicious extensions are part of a coordinated campaign that uses the same command-and-control (C2) infrastructure.

The threat actor published the extensions under five distinct publisher identities in multiple categories: Telegram sidebar clients, slot machine and Keno games, YouTube and TikTok enhancers, a text translation tool, and utilities.

According to the researchers, the campaign uses a central backend hosted on a Contabo VPS, with multiple subdomains handling session hijacking, identity collection, command execution, and monetization operations.

Socket has found evidence indicating a Russian malware-as-a-service (MaaS) operation, based on comments in the code for authentication and session theft.

Extensions linked to the same campaign

Source: Socket

Harvesting data and hijacking accounts

The largest cluster, comprising 78 extensions, injects attacker-controlled HTML into the user interface via the ‘innerHTML’ property.

The second-largest group, with 54 extensions, uses ‘chrome.identity.getAuthToken’ to collect the victim’s email, name, profile picture, and Google account ID.

... continue reading