A sophisticated cyberattack campaign that commenced in mid-December has compromised at least 16 Chrome browser extensions, putting over 600,000 users at risk of data theft. Cyberhaven, a California-based data protection firm, first reported this breach, which revealed that a phishing attack on Christmas Eve allowed hackers to upload a malicious version of their Chrome extension (version 24.10.4) to the Chrome Web Store.
The malicious code embedded in the compromised extensions was designed to capture sensitive information such as passwords and session tokens, primarily targeting users involved with social media advertising and AI platforms. Jaime Blasco from Nudge Security noted indications of other affected extensions beyond Cyberhaven’s, as multiple domains linked to the same IP address were created around the same time as the attack.
Read More: Cyber-Physical Systems: Integration and Impact
The attack’s scope appears broad, affecting various types of extensions related to VPNs, AI, productivity tools, and video downloaders. The malicious code was active for about 25 hours, from December 24 to December 26, impacting only those Chrome installations that had auto-updates enabled during this window. Cyberhaven’s internal security team detected the intrusion on Christmas Day and quickly removed the malicious extension from the store, replacing it with a secure version (24.10.5). Here is the list of affected extensions.
Category | Extensions |
Productivity | Bookmark Favicon Changer, Castorus, Primus, Parrot Talks, Reader Mode, Uvoice, Vindoz Flex Video Recorder, VidHelper Video Downloader |
AI | AI Assistant: ChatGPT and Gemini, Bard AI Chat Extension, GPT 4 Summary with OpenAI, Search Copilot AI Assistant for Chrome, TinaMInd AI AssistantWayin AI |
VPN | Internxt VPN, VPNCity |
In response to the breach, Cyberhaven has taken several actions:
Cyberhaven indicated that this attack seemed generic rather than targeted at specific companies, suggesting a widespread phishing scheme aimed at users engaged with Facebook advertising.
This incident highlights significant vulnerabilities associated with browser extensions, which are often perceived as benign but can be exploited due to their extensive permissions. The ongoing investigation seeks to determine the full extent of the breach and identify those responsible for this extensive campaign. As browser extensions continue to be a soft target for cybercriminals, both developers and users are urged to remain vigilant about security practices, ensuring regular updates and sourcing extensions from reputable providers.
Installing PHP on Windows 11 can seem troublesome, especially if you're new to programming or…
Upgrading to Windows 11 version 24H2 brings numerous benefits, including performance boosts, important security patches,…
DeepSeek is an AI firm located in Hangzhou, China, founded in May 2023 by Liang…
In the context of 5G networks and beyond, radio access network (RAN) virtualization is a…
Zero Trust Network Access (ZTNA) has emerged as a cornerstone of robust cybersecurity strategies in…
Installing Ubuntu on a Windows operating system can be a great way to explore Linux…
View Comments
Informative content .
Well-researched and well-written article! You're doing a fantastic job of educating people about online safety.
Excellent work 👏