fake extensions hijack data

The rising prevalence of malicious Chrome extensions poses significant risks to internet users, with over 100 such extensions identified since February 2024. These extensions often impersonate reputable brands such as Fortinet and YouTube, in addition to offering dubious VPN and productivity services. The ongoing, global campaign to distribute these malicious extensions targets any Chrome user, exploiting compromised developer accounts that collectively affect millions. In spite of the potential threat, many of these harmful extensions remain active on the official Chrome Web Store. Spy application installations through public charging stations can lead to similar security vulnerabilities.

The emergence of malicious Chrome extensions poses grave dangers, impacting millions through account compromises and impersonation of trusted brands.

Malicious actors employ sophisticated techniques to entice users into installing these tools. They utilize lure websites that closely mimic legitimate services, guiding unsuspecting users to install the harmful extensions. Once installed, these extensions request excessive permissions that, through the manifest.json file, grant them full browser access. Moreover, they can remotely inject malicious code post-installation, effectively bypassing Google’s security measures. Threat actors frequently utilize temporary DOM elements to circumvent existing security policies, further obfuscating their malicious activities. Unknown actors have been creating malicious extensions since February 2024 that masquerade as legitimate tools, significantly complicating user detection efforts. This risky situation is intensified by cybercriminals exploiting user trust in the Chrome Web Store.

Data theft and session hijacking are central tactics among these extensions. They can harvest sensitive browser information, such as cookies and access tokens, in addition to executing arbitrary code from attacker-controlled servers. By establishing WebSocket connections to observe user traffic, malicious extensions can redirect users to phishing sites, at the same time manipulating traffic and injecting unwanted advertisements.

Phishing attacks extend beyond users to include extension developers, where compromised accounts allow unauthorized modifications. With at least 35 extensions hijacked through developer account takeover, approximately 2.6 million users have been impacted by these breaches. These circumstances underscore the urgent need for users to verify publisher information and limit requested permissions before installation.

To mitigate the risks posed by these dangerous extensions, experts recommend using official app stores, avoiding third-party links, and regularly reviewing installed extensions. Monitoring for abnormal browser behavior further improves user protection against unsolicited ad injections and malicious redirects—critical steps in an increasingly complex threat setting.

You May Also Like

Elite Finance Leaders Worldwide Lured Into Fake Executive Offers in Ruthless Cyberattack

Elite finance leaders are under siege from sophisticated cybercriminals promising fake executive offers. How can they protect their reputations and trust? The answer may surprise you.

Real Company Websites Like Netflix and Apple Used to Lure Victims With Fake Support Numbers

Think you’re safe online? Major brands like Netflix and Apple are being exploited for scams. Are you unwittingly giving away your sensitive information?

Teen-Led Hacker Gang Scattered Spider Breaches Airlines Using Devious Social Engineering Tactics

Teens are wreaking havoc on airlines with chilling social engineering tactics. Could your personal data be next? Find out how vulnerable the industry really is.

LinkedIn Is Helping Hackers Dismantle Corporate Structures—Here’s How It’s Happening

LinkedIn’s public profiles are a playground for corporate espionage. What are the hidden dangers lurking behind your network? Protect your organization before it’s too late.