Tuesday, March 25, 2025
HomeChromeWidespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

Published on

SIEM as a Service

Follow Us on Google News

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that have compromised at least 3.2 million users.

These extensions, which include functionalities like screen capture, ad blocking, and emoji keyboards, were found to inject code into browsers, facilitating advertising and search engine optimization fraud.

The threat actor behind this campaign is believed to have acquired access to some of these extensions from their original developers rather than through a compromise, and has been trojanizing extensions since at least July 2024.

Malicious Operations

The malicious extensions operate by checking in with unique configuration servers, transmitting extension versions and hardcoded IDs, and storing configuration data locally.

They also create alarms to refresh this data periodically and degrade browser security by stripping Content Security Policy (CSP) protections.

This allows the threat actor to inject obfuscated JavaScript payloads into web pages, potentially leading to sensitive information leakage and unauthorized access.

The extensions were identified to use Bunny CDN infrastructure and DigitalOcean Apps for their configuration servers, with consistent headers indicating a single Express application.

Impact

The threat actor’s attack chain involves a complex multistage process that has not been fully replicated.

However, it is known that the malicious extensions can modify network filtering rules to make automated requests appear organic, block tracking services, and allow advertising domains.

According to the GitLab Report, this sophisticated campaign poses a significant threat to users and organizations, as it exploits the trust in the Chrome Web Store and the automatic update mechanism of browser extensions.

Following the discovery, Google was notified, and all identified extensions have been removed from the Chrome Web Store.

However, users must manually uninstall these extensions as removal from the store does not trigger automatic uninstalls.

Recommendations for individuals include being cautious with extension permissions and regularly reviewing installed extensions.

Organizations are advised to implement application controls restricting extension installations and monitor for changes in extension permissions or ownership.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in...

ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed...

IDT Corporation Partners with AccuKnox for Zero Trust Runtime IoT/Edge Security

Menlo Park, United States, March 25th, 2025, CyberNewsWireFinTech and Communications Leader, IDT Corporation partners with AccuKnox to deploy...

New Phishing Campaign Targets Mac Users to Steal Login Credentials

A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Researchers Compare Malware Development in Rust vs C and C++

Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in...

ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed...

New Phishing Campaign Targets Mac Users to Steal Login Credentials

A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from...