Malicious ChatGPT Chrome Extension Steal Facebook Accounts

Thousands of Facebook accounts have been stolen due to a trojanized version of the legitimate ChatGPT extension for Google Chrome. The trojanized version of the ChatGPT extension managed to gain popularity with more than 9,000 downloads.

Cybercriminals replicated the genuine “ChatGPT for Google” Chrome extension, providing seamless search results integration.

Besides the Facebook session cookies, the malicious version has additional code to steal them from Facebook.

This extension was published by the publisher on February 14, 2023, and made available to Chrome Web Store users. However, the publisher did not promote the title until March 14, 2023, when it used Google Search advertisements.

Malvertising on Facebook

The extension has been found to communicate with the same infrastructure as the main earlier version. An identical Chrome add-on was removed from the Chrome Web Store earlier this month after accumulating 4,000 installations. 

The operators kept a backup of this new variant on the Chrome Web Store as part of the same campaign. In short, if the first one is reported and removed, this will be used as the backup proxy.

When you search for Chat GPT 4 in Google Search results, you will notice that several advertisements accompanying the malicious extension are prominently displayed in the search results. In short, threat actors actively promote the extension through Google Ads.

Users can access the official add-on store for Chrome by clicking on the sponsored search results, which are actually fake landing pages for “ChatGPT for Google.”

It is important to note that when the victim installs the extension, the victim will get the functionality they were promised since the code of the legitimate extension is still intact.

After gaining access to your pilfered data, the malicious actor will likely peddle it off to the highest bidder. 

However, upon closer examination of their modus operandi, we have discovered that they exhibit greater attentiveness towards Facebook business accounts with a higher public profile.

A threat actor can use these stolen cookies to log into a Facebook account in the user’s name and gain complete access to the user’s profile and any advertising features for the business that may be available.

Here a list of Facebook-related cookies is obtained by the malware using a Chrome Extension API, and then they are encrypted using an AES key and sent to the malware through a secure channel.

After securing the stolen information, it will send it to the attacker’s server using a GET request.

Once the stolen cookies have been decrypted, the threat actors use them to hijack the Facebook sessions of their victims to run malvertising campaigns or to promote prohibited material, such as propaganda from ISIS.

To prevent victims from regaining control over their Facebook accounts, the malware automatically changes the login information on breached accounts so they can’t gain access to their accounts in the future.

Since its release, this extension has gained much popularity among users worldwide, with over 2000 installed daily. 

This malicious extension for Google Chrome is still available in the Google Chrome Web Store and needs to be removed. In spite of this, the Chrome Web Store team was alerted to the malicious extension and is expected to be removed shortly.

Building Your Malware Defense Strategy – Download Free E-Book

Related Coverage:

Guru baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Microsoft Windows Ntqueryinformationtoken Flaw Let Attackers Escalate Privileges

Microsoft has disclosed a critical vulnerability identified as CVE-2024-30088. With a CVSS score of 8.8, this flaw affects Microsoft Windows and allows local attackers to escalate their privileges on affected…

55 mins ago

256,000+ Publicly Exposed Windows Servers Vulnerable to MSMQ RCE Flaw

Cybersecurity watchdog Shadowserver has identified 256,000+ publicly exposed servers vulnerable to a critical Remote Code Execution (RCE) flaw in Microsoft…

3 hours ago

Indian National Jailed For Hacked Servers Of Company That Fired Him

An Indian national was sentenced to two years and eight months in jail for unauthorized access to his former employer's…

3 hours ago

JetBrains Warns of GitHub Plugin that Exposes Access Tokens

A critical vulnerability (CVE-2024-37051) in the JetBrains GitHub plugin for IntelliJ-based IDEs (2023.1 and later) exposed access tokens to malicious…

18 hours ago

Critical Flaw In Apple Ecosystems Let Attackers Gain Unauthorized Access

Hackers go for Apple due to its massive user base along with rich customers, including business people and managers who…

18 hours ago

Hackers Exploiting Linux SSH Services to Deploy Malware

SSH and RDP provide remote access to server machines (Linux and Windows respectively) for administration. Both protocols are vulnerable to…

18 hours ago