Malicious extension lets attackers control Google Chrome remotely

Teilen:

A new Chrome browser botnet named ‘Cloud9’ has been discovered in the wild using malicious extensions to steal online accounts, log keystrokes, inject ads and malicious JS code, and enlist the victim’s browser in DDoS attacks.

The Cloud9 browser botnet is effectively a remote access trojan (RAT) for the Chromium web browser, including Google Chrome and Microsoft Edge, allowing the threat actor to remotely execute commands.

The malicious Chrome extension isn’t available on the official Chrome web store but is instead circulated through alternative channels, such as websites pushing fake Adobe Flash Player updates.

The malicious browser extension on Chrome (Zimperium)

This method appears to be working well, as researchers at Zimperium reported today that they have seen Cloud9 infections on systems across the globe.

Infecting your browser

Cloud9 is a malicious browser extension that backdoors Chromium browsers to perform an extensive list of malicious functions and capabilities.

The extension consists of three JavaScript files for collecting system information, mining cryptocurrency using the host’s resources, performing DDoS attacks, and injecting scripts that run browser exploits.

Zimperium noticed the loading of exploits for the CVE-2019-11708 and CVE-2019-9810 vulnerabilities in Firefox, CVE-2014-6332 and CVE-2016-0189 for Internet Explorer, and CVE-2016-7200 for Edge.

These vulnerabilities are used to automatically install and execute Windows malware on the host, enabling the attackers to conduct even more significant system compromises.

However, even without the Windows malware component, the Cloud9 extension can steal cookies from the compromised browser, which the threat actors can use to hijack valid user sessions and take over accounts.

The browser cookie stealer (Zimperium)

Additionally, the malware features a keylogger that can snoop for key presses to steal passwords and other sensitive information.

A “clipper” module is also present in the extension, constantly monitoring the system clipboard for copied passwords or credit cards.

Cloud9’s clipper component (Zimperium)

Cloud9 can also inject ads by silently loading webpages to generate ad impressions and, thus, revenue for its operators.

Finally, the malware can enlist the host’s firepower to perform layer 7 DDoS attacks via HTTP POST requests to the target domain.

“Layer 7 attacks are usually very hard to detect because the TCP connection looks very similar to legitimate requests,” comments Zimperium.

“The developer is likely using this botnet to provide a service to perform DDOS.”

Operators and targets

The hackers behind Cloud9 are believed to have ties to the Keksec malware group because the C2 domains used in the recent campaign were seen in Keksec’s past attacks.

Keksec is responsible for developing and running multiple botnet projects, including EnemyBot, Tsunamy, Gafgyt, DarkHTTP, DarkIRC, and Necro.

The victims of Cloud9 are spread worldwide, and screenshots posted by the threat actor on forums indicate that they target various browsers.

Screenshot of Cloud9 panel (Zimperium)

Also, the public promotion of Cloud9 on cybercrime forums leads Zimperium to believe that Keksec is likely selling/renting it to other operators.

Update 11/9 – A Google spokesperson has provided the following comment to BleepingComputer:

We always recommend users update to the latest version of Google Chrome to ensure they have the most up-to-date security protections.

Users can also stay better protected from malicious executables and websites by enabling Enhanced Protection in the privacy and security settings in Chrome.

Enhanced Protection automatically warns you about potentially risky sites and downloads and inspects the safety of your downloads and warns you when a file may be dangerous.

https://www.bleepingcomputer.com/news/security/malicious-extension-lets-attackers-control-google-chrome-remotely/

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
10:34 am, Juli 9, 2025
Wetter-Symbol 21°C
L: 20° | H: 23°
klarer Himmel
Luftfeuchtigkeit: 56 %
Druck: 1021 mb
Wind: 8 mph W
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 2%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:54 am
Sonnenuntergang: 9:16 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
20° | 23°°C 0.88 mm 88% 6 mph 57 % 1022 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
18° | 30°°C 0 mm 0% 8 mph 76 % 1023 mb 0 mm/h
Fr. Juli 11 10:00 pm
Wetter-Symbol
19° | 29°°C 0 mm 0% 8 mph 56 % 1022 mb 0 mm/h
Sa. Juli 12 10:00 pm
Wetter-Symbol
19° | 30°°C 0 mm 0% 10 mph 68 % 1019 mb 0 mm/h
So. Juli 13 10:00 pm
Wetter-Symbol
18° | 31°°C 0 mm 0% 10 mph 68 % 1016 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
22° | 23°°C 0 mm 0% 6 mph 57 % 1021 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
25° | 26°°C 0.88 mm 88% 4 mph 51 % 1021 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
25° | 25°°C 0.31 mm 31% 3 mph 51 % 1021 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
22° | 22°°C 0 mm 0% 3 mph 57 % 1022 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
21° | 21°°C 0 mm 0% 2 mph 67 % 1022 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 3 mph 76 % 1022 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 3 mph 69 % 1023 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
24° | 24°°C 0 mm 0% 4 mph 51 % 1023 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,673.64
0.30%
Ethereum(ETH)
€2,226.65
2.46%
Fesseln(USDT)
€0.85
0.01%
XRP(XRP)
€1.99
2.30%
Solana(SOL)
€130.11
1.58%
USDC(USDC)
€0.85
0.01%
Dogecoin(DOGE)
€0.146162
1.76%
Shiba Inu(SHIB)
€0.000010
1.60%
Pepe(PEPE)
€0.000009
2.69%
Nach oben scrollen