Monday, February 24, 2025
HomeChromeWidespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

Published on

SIEM as a Service

Follow Us on Google News

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that have compromised at least 3.2 million users.

These extensions, which include functionalities like screen capture, ad blocking, and emoji keyboards, were found to inject code into browsers, facilitating advertising and search engine optimization fraud.

The threat actor behind this campaign is believed to have acquired access to some of these extensions from their original developers rather than through a compromise, and has been trojanizing extensions since at least July 2024.

Malicious Operations

The malicious extensions operate by checking in with unique configuration servers, transmitting extension versions and hardcoded IDs, and storing configuration data locally.

They also create alarms to refresh this data periodically and degrade browser security by stripping Content Security Policy (CSP) protections.

This allows the threat actor to inject obfuscated JavaScript payloads into web pages, potentially leading to sensitive information leakage and unauthorized access.

The extensions were identified to use Bunny CDN infrastructure and DigitalOcean Apps for their configuration servers, with consistent headers indicating a single Express application.

Impact

The threat actor’s attack chain involves a complex multistage process that has not been fully replicated.

However, it is known that the malicious extensions can modify network filtering rules to make automated requests appear organic, block tracking services, and allow advertising domains.

According to the GitLab Report, this sophisticated campaign poses a significant threat to users and organizations, as it exploits the trust in the Chrome Web Store and the automatic update mechanism of browser extensions.

Following the discovery, Google was notified, and all identified extensions have been removed from the Chrome Web Store.

However, users must manually uninstall these extensions as removal from the store does not trigger automatic uninstalls.

Recommendations for individuals include being cautious with extension permissions and regularly reviewing installed extensions.

Organizations are advised to implement application controls restricting extension installations and monitor for changes in extension permissions or ownership.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Sliver C2 Server Vulnerability Enables TCP Hijacking for Traffic Interception

A significant vulnerability has been discovered in the Sliver C2 server, a popular open-source...

TSforge New Tool Bypasses Windows Activation on All Versions

A significant breakthrough in bypassing Windows activation has been achieved with the introduction of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Sliver C2 Server Vulnerability Enables TCP Hijacking for Traffic Interception

A significant vulnerability has been discovered in the Sliver C2 server, a popular open-source...