Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » 16 Hacked Chrome Extensions That Exposed Over 600,000 Users to Data Theft
Global Security

16 Hacked Chrome Extensions That Exposed Over 600,000 Users to Data Theft

AdminBy AdminDecember 29, 2024No Comments3 Mins Read
Chrome Extensions
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 29, 2025Ravi LakshmananEndpoint Protection / Browser Security

Chrome extensions

The new attack campaign targeted popular Chrome browser extensions, leading to the hacking of at least 16 extensions and exposing more than 600,000 users to data exposure and credential theft.

The attack targeted browser extension publishers in the Chrome Web Store via a phishing campaign and used their access rights to inject malicious code into legitimate extensions to steal users’ cookies and access tokens.

Cybersecurity firm Cyberhaven was the first company exposed.

December 27 Cyberhaven opened that the threat actor compromised his browser extension and injected malicious code to communicate with an external command and control (C&C) server located in the cyberhavenext(.)pro domain, download additional configuration files, and steal user data.

“Browser extensions are the soft foundation of web security,” says Or Eshed, the company’s CEO. LayerX securitywhich specializes in browser extension security. “While we tend to think of browser extensions as harmless, in practice they often grant broad permissions to sensitive user information such as cookies, access tokens, credentials, and more.

Cyber ​​security

“Many organizations don’t even know what extensions they have installed on their endpoints, and don’t realize the extent of their impact,” Eshed says.

After the Cyberhaven hack became known, additional extensions were quickly discovered that were also hacked and communicating with the same C&C server.

Jamie Blaska, CTO of SaaS security company Nudge Security, additional permission domains are defined to the same IP address of the C&C server used for the Cyberhaven hack.

Additional browser extensions currently suspected of being compromised include:

  • AI Assistant – ChatGPT and Gemini for Chrome
  • Bard AI chat extension
  • Summary of GPT 4 with OpenAI
  • Search Copilot AI Assistant for Chrome
  • TinaMInd AI assistant
  • Way of AI
  • VPNCity
  • Internxt VPN
  • Video recorder Windows flex
  • VidHelper video downloader
  • Change bookmark icons
  • Castor
  • Voice
  • Reading mode
  • Conversations of parrots
  • Compulsion

These additional compromised extensions suggest that Cyberhaven was not a one-off target, but part of a large-scale attack campaign targeting legitimate browser extensions.

Cyber ​​security

Analysis of the compromised Cyberhaven shows that the malicious code targeted the credentials and access tokens of Facebook accounts and Facebook business accounts in particular:

User data collected by compromised Cyberhaven browser extension (source: Cyberhaven)
User data collected by compromised Cyberhaven browser extension (source: Cyberhaven)

Cyberhaven reports that the malicious version of the browser extension was removed approximately 24 hours after it went live. Some of the other extensions detected have also already been updated or removed from the Chrome Web Store.

However, just because an extension has been removed from the Chrome store doesn’t mean the impact is over, says Or Eshed. “As long as the compromised version of the extension is still running on the endpoint, hackers can still access it and steal data,” he says.

Security researchers continue to look for more exposed extensions, but the sophistication and scope of this attack has raised the stakes for many organizations to secure extensions for their browsers.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.