Malicious Code Found in Chrome Extensions Targeting Major Social Media Platforms

Đăng bởi: Ngày: 29/12/2024

A worrying trend in the realm of cybersecurity has recently emerged with the revelation of a cyberattack campaign that began infiltrating multiple Chrome browser extensions as early as mid-December. These attacks have raised concerns over the security of user data, particularly in relation to social media advertising and AI platforms. Cyberhaven, one of the companies embroiled in the attack, disclosed that malicious code inserted into its extension was aimed at stealing browser cookies and authentication sessions.
According to a blog post by Cyberhaven, the cyberattack was likely initiated through a phishing email which directed hackers to inject harmful code. Notably, the primary focus of the attack seems to have been on Facebook Ads accounts, indicating a targeted approach within the large and lucrative arena of social media advertising. Security researcher Jaime Blasco commented on the situation, suggesting that while Cyberhaven may have been affected, the overall assault appeared to be random with unsuspecting users of various VPN and AI extensions also encountering the same malicious code.
As reported by Bleeping Computer, several other extensions could potentially be impacted by these security breaches. These extensions include Internxt VPN, VPNCity, Uvoice, and ParrotTalks, highlighting the breadth of the infiltration and the vulnerability of popular tools used by many internet users today. The consequences of such breaches can be severe, with risks ranging from unauthorized access to sensitive information to potential financial losses.
The attack culminated on Christmas Eve when hackers pushed a compromised update (version 24.10.4) of the Cyberhaven data loss prevention extension, which contained the nefarious code. Cyberhaven only discovered the malicious presence of the code hours later on December 25, around 6:54 PM ET. The company promptly removed the code within an hour, yet it had remained active until approximately 9:50 PM ET that same day. In response, Cyberhaven has released a clean version of its extension as part of an update (version 24.10.5), ensuring that users can feel secure once more.
In light of this incident, Cyberhaven has provided some crucial recommendations for other companies that may have been affected by this alarming cyberattack. They advise organizations to thoroughly check their logs for any suspicious activity as a precautionary measure. Additionally, they urge companies to revoke or rotate any passwords not leveraging the FIDO2 multifactor authentication standard, which offers an extra layer of protection. Prior to publishing technical analyses on the situation, Cyberhaven made sure to notify customers through email communications to ensure they were informed of the security breach.
As this cyberattack highlights the vulnerability of popular Chrome extensions, it serves as a stark reminder for individuals and organizations alike to remain vigilant against such threats. Ensuring the integrity of web tools and implementing robust security protocols will be vital in mitigating the risks posed by sophisticated cybercriminals. This situation stands as a call to action in enhancing cybersecurity measures across the digital landscape, particularly as more users increasingly rely on various extensions for internet convenience.