Saturday, June 15, 2024

Malicious ChatGPT Chrome Extension Steal Facebook Accounts

Thousands of Facebook accounts have been stolen due to a trojanized version of the legitimate ChatGPT extension for Google Chrome. The trojanized version of the ChatGPT extension managed to gain popularity with more than 9,000 downloads.

Cybercriminals replicated the genuine “ChatGPT for Google” Chrome extension, providing seamless search results integration.

Besides the Facebook session cookies, the malicious version has additional code to steal them from Facebook.

This extension was published by the publisher on February 14, 2023, and made available to Chrome Web Store users. However, the publisher did not promote the title until March 14, 2023, when it used Google Search advertisements.

Malvertising on Facebook

The extension has been found to communicate with the same infrastructure as the main earlier version. An identical Chrome add-on was removed from the Chrome Web Store earlier this month after accumulating 4,000 installations. 

The operators kept a backup of this new variant on the Chrome Web Store as part of the same campaign. In short, if the first one is reported and removed, this will be used as the backup proxy.

When you search for Chat GPT 4 in Google Search results, you will notice that several advertisements accompanying the malicious extension are prominently displayed in the search results. In short, threat actors actively promote the extension through Google Ads.

Users can access the official add-on store for Chrome by clicking on the sponsored search results, which are actually fake landing pages for “ChatGPT for Google.”

It is important to note that when the victim installs the extension, the victim will get the functionality they were promised since the code of the legitimate extension is still intact.

After gaining access to your pilfered data, the malicious actor will likely peddle it off to the highest bidder. 

However, upon closer examination of their modus operandi, we have discovered that they exhibit greater attentiveness towards Facebook business accounts with a higher public profile.

A threat actor can use these stolen cookies to log into a Facebook account in the user’s name and gain complete access to the user’s profile and any advertising features for the business that may be available.

Here a list of Facebook-related cookies is obtained by the malware using a Chrome Extension API, and then they are encrypted using an AES key and sent to the malware through a secure channel.

After securing the stolen information, it will send it to the attacker’s server using a GET request.

Once the stolen cookies have been decrypted, the threat actors use them to hijack the Facebook sessions of their victims to run malvertising campaigns or to promote prohibited material, such as propaganda from ISIS.

To prevent victims from regaining control over their Facebook accounts, the malware automatically changes the login information on breached accounts so they can’t gain access to their accounts in the future.

Since its release, this extension has gained much popularity among users worldwide, with over 2000 installed daily. 

This malicious extension for Google Chrome is still available in the Google Chrome Web Store and needs to be removed. In spite of this, the Chrome Web Store team was alerted to the malicious extension and is expected to be removed shortly.

Building Your Malware Defense Strategy – Download Free E-Book

Related Coverage:

Website

Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles