Friday, January 24, 2025
HomeCyber AIMalicious ChatGPT Chrome Extension Steal Facebook Accounts

Malicious ChatGPT Chrome Extension Steal Facebook Accounts

Published on

SIEM as a Service

Follow Us on Google News

Thousands of Facebook accounts have been stolen due to a trojanized version of the legitimate ChatGPT extension for Google Chrome. The trojanized version of the ChatGPT extension managed to gain popularity with more than 9,000 downloads.

Cybercriminals replicated the genuine “ChatGPT for Google” Chrome extension, providing seamless search results integration.

Besides the Facebook session cookies, the malicious version has additional code to steal them from Facebook.

This extension was published by the publisher on February 14, 2023, and made available to Chrome Web Store users. However, the publisher did not promote the title until March 14, 2023, when it used Google Search advertisements.

Malvertising on Facebook

The extension has been found to communicate with the same infrastructure as the main earlier version. An identical Chrome add-on was removed from the Chrome Web Store earlier this month after accumulating 4,000 installations. 

The operators kept a backup of this new variant on the Chrome Web Store as part of the same campaign. In short, if the first one is reported and removed, this will be used as the backup proxy.

When you search for Chat GPT 4 in Google Search results, you will notice that several advertisements accompanying the malicious extension are prominently displayed in the search results. In short, threat actors actively promote the extension through Google Ads.

Users can access the official add-on store for Chrome by clicking on the sponsored search results, which are actually fake landing pages for “ChatGPT for Google.”

It is important to note that when the victim installs the extension, the victim will get the functionality they were promised since the code of the legitimate extension is still intact.

After gaining access to your pilfered data, the malicious actor will likely peddle it off to the highest bidder. 

However, upon closer examination of their modus operandi, we have discovered that they exhibit greater attentiveness towards Facebook business accounts with a higher public profile.

A threat actor can use these stolen cookies to log into a Facebook account in the user’s name and gain complete access to the user’s profile and any advertising features for the business that may be available.

Here a list of Facebook-related cookies is obtained by the malware using a Chrome Extension API, and then they are encrypted using an AES key and sent to the malware through a secure channel.

After securing the stolen information, it will send it to the attacker’s server using a GET request.

Once the stolen cookies have been decrypted, the threat actors use them to hijack the Facebook sessions of their victims to run malvertising campaigns or to promote prohibited material, such as propaganda from ISIS.

To prevent victims from regaining control over their Facebook accounts, the malware automatically changes the login information on breached accounts so they can’t gain access to their accounts in the future.

Since its release, this extension has gained much popularity among users worldwide, with over 2000 installed daily. 

This malicious extension for Google Chrome is still available in the Google Chrome Web Store and needs to be removed. In spite of this, the Chrome Web Store team was alerted to the malicious extension and is expected to be removed shortly.

Building Your Malware Defense Strategy – Download Free E-Book

Related Coverage:

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...