More than 2.6 Million Devices Compromised by Malicious Backdoored Chrome Extensions

More than 2.6 Million Devices Compromised by Malicious Backdoored Chrome Extensions

More than 2.6 Million Devices Compromised by Malicious Backdoored Chrome Extensions


### The Escalating Risk of Harmful Chrome Extensions: An In-Depth Look at Recent Credential Theft Schemes

In a troubling turn of events for cybersecurity, two distinct initiatives have been taking advantage of browser extensions to seize sensitive information, such as credentials and browsing history, from millions of individuals. These initiatives underscore the ongoing weaknesses in browser extensions and the necessity for increased vigilance and proactive strategies to counter such risks.

### **The Revelation of Harmful Chrome Extensions**

As the festive season progressed, cybersecurity experts revealed a shocking finding: at least 33 browser extensions listed on the Google Chrome Web Store had been infiltrated. These extensions, some of which were operational for up to 18 months, had been covertly collecting sensitive information from around 2.6 million devices.

The investigation was initiated by Cyberhaven, a data loss prevention service, which discovered that its own Chrome extension—utilized by 400,000 clients—had been affected. The malicious iteration of the extension, known as version 24.10.4, was active for 31 hours from December 25 to December 26, 2024. During this interval, Chrome browsers automatically downloaded and implemented the harmful update, placing users at considerable risk.

### **The Course of the Attack**

The attackers launched a sophisticated spear-phishing strategy aimed at the developers of the Cyberhaven extension. A phishing message, dispatched on Christmas Eve, falsely asserted that the extension was in violation of Google’s regulations and would be taken down unless immediate action was executed. This message included a link to a Google OAuth consent page, which solicited access permissions for a fraudulent application titled “Privacy Policy Extension.”

Unwittingly, a developer from Cyberhaven granted these permissions, which enabled the attackers to upload a malicious version of the extension to the Chrome Web Store. This variant was engineered to download additional payloads from a malicious site, cyberhavenext[.]pro, which imitated the authentic Cyberhaven domain. These payloads aimed at extracting browser cookies and authentication credentials from platforms such as Facebook and ChatGPT.

### **A Wider Campaign Assaulting Multiple Extensions**

The Cyberhaven event was not a sole occurrence. As awareness of the attack grew, researchers recognized 19 other Chrome extensions that had been similarly affected. Together, these extensions boasted 1.46 million downloads. The attackers utilized identical spear-phishing tactics and counterfeit look-alike domains to distribute harmful payloads and capture sensitive information.

The earliest confirmed breach in this campaign traces back to May 2024. Compromised extensions featured well-known tools such as VPNCity, Reader Mode, and Bookmark Favicon Changer. In several instances, the harmful versions remained operational for multiple days before being corrected or eliminated.

### **A Secondary Campaign: Monetization Libraries Gone Awry**

In a concurrent campaign, researchers identified that another group of extensions had been compromised via a third-party code library utilized for monetization purposes. This library gathered extensive information regarding users’ online behavior as a trade-off for providing developers with a commission. Extensions like Reader Mode and Visual Effects for Google Meet were part of the 13 identified as utilizing this library, collectively impacting 1.14 million users.

This campaign, which began as soon as April 2023, underscores the dangers tied to incorporating third-party code into browser extensions. Even though such libraries provide financial incentives for developers, they can also introduce substantial security flaws.

### **The Consequences for Users and Organizations**

The recent campaigns bring to light the ongoing vulnerabilities in browser extensions, which frequently represent an overlooked attack vector. By their very nature, extensions necessitate extensive permissions to operate, rendering them appealing targets for threat actors. Once compromised, they can grant attackers access to sensitive data, including login credentials, cookies, and browsing history.

For organizations, these incidents emphasize the critical need for implementing strong browser asset management practices. Security teams should maintain a whitelist of approved extensions and enforce strict version management to ensure that only trusted editions are deployed. Furthermore, organizations should inform employees about the dangers of browser extensions and prompt them to report any questionable behavior.

### **What Users Can Take Action On**

If you suspect that a compromised extension has been installed, take these steps promptly:

1. **Remove the Extension**: Uninstall the extension from your browser to halt any further data breaches.
2. **Update Passwords**: Change passwords for all accounts, particularly for those accessed during the timeframe the harmful extension was in operation.
3. **Activate Multi-Factor Authentication (MFA)**: Introduce an additional security layer to your accounts to lessen the impact of compromised credentials.
4. **Watch for Suspicious Activity**: Regularly monitor your accounts for unauthorized access or unusual behavior.
5. **Utilize Browser Security Tools**: Consider employing tools that oversee and manage browser extensions for potential threats.

### **The Way Ahead**

The recent attacks serve as a wake-up call for both users and developers. For developers, these incidents underscore the necessity for stringent security protocols, including routine code assessments and the adoption of secure development environments. For users, they