Chrome-Erweiterung einer Cybersecurity-Firma wird gekapert, um Daten von Nutzern zu stehlen

Teilen:

At least five Chrome extensions were compromised in a coordinated attack where a threat actor injected code that steals sensitive information from users.

One attack was disclosed by Cyberhaven, a data loss prevention company that alerted its customers of a breach on December 24 after a successful phishing attack on an administrator account for the Google Chrome store.

Among Cyberhaven’s customers are Snowflake, Motorola, Canon, Reddit, AmeriHealth, Cooley, IVP, Navan, DBS, Upstart, and Kirkland & Ellis.

The hacker hijacked the employee’s account and published a malicious version (24.10.4) of the Cyberhaven extension, which included code that could exfiltrate authenticated sessions and cookies to the attacker’s domain (cyberhavenext[.]pro).

Cyberhaven’s internal security team removed the malicious package within an hour since its detection, the company says in an email to its customers.

A clean version of the extension, v24.10.5 was published on December 26. Apart from upgrading to the latest version, users of the Cyberhaven Chrome extension are recommended to revoke passwords that aren’t FIDOv2, rotate all API tokens, and review browser logs to evaluate malicious activity.

More Chrome extensions breached

Following Cyberhaven’s disclosure, Nudge Security researcher Jaime Blasco took the investigation further, pivoting from the attacker’s IP addresses and registered domains.

According to Blasco, the malicious code snippet that let the extension receive commands from the attacker was also injected around the same time in other Chrome extensions:

  • Internxt VPN – Free, encrypted, unlimited VPN for secure browsing. (10,000 users)
  • VPNCity – Privacy-focused VPN with AES 256-bit encryption and global server coverage. (50,000 users)
  • Uvoice – Rewards-based service for earning points through surveys and providing PC usage data. (40,000 users)
  • ParrotTalks – Information search tool specializing in text and seamless note-taking. (40,000 users)

Blasco found more domains that point to other potential victims but only the extensions above were confirmed to carry the malicious code snippet.

Cybersecurity researcher John Tuckner has found an additional set of extensions which also had the same malicious snippet injected on their code.

These are Bookmark Favicon Changer, Castorus, Wayin AI, Search Copilot AI Assistant, VidHelper, Vidnoz Flex, TinaMind, Primus, AI Shop Buddy, Sort by Oldest, Earny, ChatGPT Assistant, Keyboard History Recorder, and Email Hunter.

The additional set of extensions infected by the data stealing code have a collective download count of almost 380,000.

There have also been additional cases of compromise such as Visual Effects for Google Meet, Rewards Search Automator, Tackker, Bard AI chat, and Reader Mode, but these have been removed from Chrome’s Web Store.

Users of these extensions are recommended to either remove them from the browser or upgrade to a safe version published after December 26 after making sure that the publisher has learned about the security issue and fixed it.

If unsure, it would be better to uninstall the extension, reset important account passwords, clear browser data, and reset browser settings to their original defaults.

Keep Aware has also published a write-up where they share more info about the functionality of the malicious code and how to detect compromise.

Update 12/30 – Added more extensions confirmed to have been compromised, and link to more info about the code.

Quelle

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
8:57 am, Jan. 17, 2025
Wetter-Symbol 5°C
L: 4° | H: 6°
overcast clouds
Luftfeuchtigkeit: 87 %
Druck: 1035 mb
Wind: 7 mph SSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:57 am
Sonnenuntergang: 4:23 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
4° | 6°°C 0 mm 0% 5 mph 88 % 1035 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
2° | 7°°C 0 mm 0% 4 mph 85 % 1033 mb 0 mm/h
So. Jan. 19 9:00 pm
Wetter-Symbol
2° | 6°°C 0 mm 0% 4 mph 93 % 1024 mb 0 mm/h
Mo. Jan. 20 9:00 pm
Wetter-Symbol
2° | 6°°C 0 mm 0% 4 mph 93 % 1020 mb 0 mm/h
Di. Jan. 21 9:00 pm
Wetter-Symbol
4° | 7°°C 0 mm 0% 4 mph 97 % 1020 mb 0 mm/h
Today 9:00 am
Wetter-Symbol
3° | 5°°C 0 mm 0% 3 mph 87 % 1035 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
5° | 6°°C 0 mm 0% 5 mph 83 % 1035 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
6° | 7°°C 0 mm 0% 3 mph 79 % 1034 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
5° | 5°°C 0 mm 0% 3 mph 88 % 1034 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 86 % 1034 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 3 mph 84 % 1033 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
2° | 2°°C 0 mm 0% 2 mph 84 % 1032 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
2° | 2°°C 0 mm 0% 1 mph 85 % 1031 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€99,088.04
3.15%
Ethereum(ETH)
€3,302.37
2.45%
XRP(XRP)
€3.16
5.77%
Fesseln(USDT)
€0.97
0.00%
Solana(SOL)
€209.19
7.75%
Dogecoin(DOGE)
€0.404542
12.40%
USDC(USDC)
€0.97
0.00%
Shiba Inu(SHIB)
€0.000023
10.21%
Pepe(PEPE)
€0.000019
7.53%
Peanut das Eichhörnchen(PNUT)
€0.62
4.47%
Nach oben scrollen