Categories: Security NewsWhat is

Four Malicious Chrome Extensions Impacted More than Half a Million Users

Security researchers from Cybersecurity firm ICEBRG detected four malicious chrome extensions that impacted more than half a million people.

The initial investigation started after they noticed an unusual traffic flow in one of their client workstation, it appears like attackers use the extensions to conduct click fraud for generating more revenue or for SEO purpose.

Four Malicious Chrome Extensions

Change HTTP Request Header

Researchers identified the HTTP traffic is to the domain change-request[dot]info from the malicious chrome extension “Change HTTP Request Header”. And the control server at change-request[dot]info returns obfuscated Javascript.

The Javascript creates a WebSocket tunnel with change-request[dot]info control server and the WebSocket to proxy victim browser traffic. Attackers utilized it for running a click fraud ad campaign. ICEBRG published a detailed report on extension behaviors.

Nyoogle – Custom Logo for Google and Lite Bookmarks

Like Change HTTP Request Header, Nyoogle and Lite Bookmarks utilize a similar mix of allowing ‘unsafe-eval’ through the CSP with periodical configuration

Stickies – Chrome’s Post-it Notes

It also enables the ‘unsafe-eval’ via the CSP but uses obfuscation methods to retrieve the external javascript.

Chrome Extensions continue to get compromised, the initial compromise on Aug1, attackers used Copyfish extension to spread spam. Malware files have a size far beyond the ordinary and far beyond what is usually inspected for anti-virus solutions.

Now even the Chrome extension started mining cryptocurrency, a chrome extension Archive Poster with more than 105,000 users Caught injecting an in-browser cryptocurrency miner.

Chrome announced site isolation with Chrome 63 which allows each website to have a dedicated process isolated from other sites, allows to Whitelist or Blacklist specific extensions.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

6 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

7 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

9 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

13 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

14 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

14 hours ago