Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Researchers put up a new polymorphic attack that expands clone browsers to steal powers
Global Security

Researchers put up a new polymorphic attack that expands clone browsers to steal powers

AdminBy AdminMarch 10, 2025No Comments2 Mins Read
Clones Browser Extensions
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 10, 2025Red LakshmananCybersecurity / malicious software

Expanding the clone browser

Cybersecurity researchers have demonstrated a new technique that allows you to expand the malicious browser to bring themselves for any installed additions.

“Polymorphic extensions create a pixel perfect copy of the target icon, HTML Popup, work processes and even temporarily disables the legitimate expansion, making it extremely convincing to the victims that they provide real expansion, Squarex – Note In a report published last week.

The proclamated powers can then be abused by the threat of internet capture and gain unauthorized access to sensitive personal and financial information. The attack affects all chromium-based web browsers, including Google Chrome, Microsoft Edge, Brave, Opera and others.

The banks approach to the fact that users usually secure the browser tool panel. In a hypothetical attack scenario, the threatening actors could publish polymorphic expansion in the Chrome web shop (or in any expansion market) and mask it into use.

Cybersecurity

While the app provides advertised functionality to avoid any suspicion, it activates malicious features in the background, actively scanning the presence of web resources that correlate with certain targeted extensions using a technique called Heb Resource.

Once a suitable expansion of the target is detected, the attack goes to the next stage, resulting in a replica of legitimate expansion. This is carried out by changing the Rogue extension icon to match the goal and temporarily disable the actual supplement through API “Chrome.Management”, which causes it to be removed from the toolbar.

https://www.youtube.com/watch?v=i5pifa3jty

“The polymorphic expansion attack is extremely powerful because it uses a person’s inclination to rely on visual signals as confirmation,” Squarex said. “In this case, the expansion icons on the pinched panel are used to inform users about the tools they interact with.”

The conclusions come in a month after the company too disclosed Another method of attack called Browser Synckcking, which allows you to seize control over the victim’s device with a seemingly harmless browser extension.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.