Wednesday, January 15, 2025
HomeHacksSeven More Chrome Extensions compromised to hijack traffic and substitute advertisements on...

Seven More Chrome Extensions compromised to hijack traffic and substitute advertisements on users browsers

Published on

Chrome Extensions continue to get compromised, the initial compromise on Aug1, attackers used Copyfish extension to spread spam. Now add to the list another seven extensions has been compromised.

Attackers using phishing methods to steal account credentials of Author’s which results in hijacking traffic and exposing users to fake popups and password theft.

Proofpoint published a report that shows more extensions has been hijacked Web Developer 0.4.9” extension compromise, but found evidence that “Chrometana 1.1.3”, “Infinity New Tab 3.12.3” [8][10] , “CopyFish 2.8.5” [9], “Web Paint 1.2.1” [11], and “Social Fixer 20.1.1” [12]. They do believe TouchVPN and Betternet VPN also compromised.

According to their Proofpoint analysis, the compromised extension will check for the chrome extension for 10 minutes and then it uses to retrieve remote file ga.js over HTTPS secure connection.

Compromised version of the extension attempts to substitute ads on the victim’s browser, hijacking traffic from legitimate advertising networks.

Also read Google Fixes 26 High-Severity Flaws In Chrome Browser – Google Paid 70000$ to External Researchers

Compromised version of the extension attempts to substitute ads on the victim’s browser, hijacking traffic from legitimate advertising networks.

Chrome extension
Source: Proofpoint

For ad units, attackers created well-crafted substitutions to hide adult websites.

Also, they use to generate a fake Java Script alert and then some affiliate programs receiving the Hijacked traffic.

Chrome extensions
Source: Proofpoint

An examination of the affiliate landing pages (program update[.]info, program update[.]info and searchtab[.]win) demonstrated that activity was “considerable.” According to Proofpoint, searchtab[.]win got 920,000 visits in one month. It’s vague the amount of that activity was created through the hijacked Chrome Extensions.

Chrome extensions
Source: Proofpoint
In addition to hijacking traffic and driving users to questionable affiliate programs, we have also observed them gathering and exfiltrating Cloudflare credentials, providing the actors with new means of potential future attacks. Says researchers from Proofpoint.

Also read Sophisticated Backdoor Called “Stantinko” Infected More Than 500,000 Computers

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Aembit Announces Speaker Lineup for the Inaugural NHIcon

Aembit, the non-human identity and access management (IAM) company, unveiled the full agenda for...

Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%

Sweet Security, a leader in cloud runtime detection and response, today announced the launch...

ShadowSyndicate Hackers Added RansomHub Ransomware to their Arsenal

ShadowSyndicate is a prolific threat actor that has been active since July 2022, collaborated...

5,000 WordPress Sites Hacked in New WP3.XYZ Malware Attack

Widespread malware campaigns detected by side crawlers exploit vulnerabilities on multiple websites where the...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Casio Hacked – Servers Compromised by a Ransomware Attack

Casio Computer Co., Ltd. has confirmed a significant cybersecurity breach after its servers were...

AT&T and Verizon Hacked – Salt Typhoon Compromised The Network For High Profiles

AT&T and Verizon Communications, two of America's largest telecommunications providers, have confirmed they were...