malicious chrome extension scams

How cybercriminals are exploiting the Chrome Web Store has become alarmingly clear, as security researchers have revealed more than 100 malicious extensions since February 2024 that have collectively compromised over 2.6 million users.

The fraudulent extensions, masquerading as legitimate tools from Fortinet, VPN providers, and YouTube utilities, have successfully deceived users by appearing on the official Chrome Web Store during harboring malicious code designed to steal sensitive data. These malicious browser tools primarily focus on session hijacking attacks.

These sophisticated attacks utilize multiple deception tactics, including the creation of convincing replica websites that mimic legitimate services. The attackers employed a consent phishing strategy to manipulate users into granting dangerous permissions through OAuth flows. While protection tools like AI-powered detection can help identify these threats, many users remain vulnerable without proper security measures.

Once installed, the malicious extensions exploit excessive permissions granted through manifest files to access users’ browser activities, credentials, and session data. Some extensions establish WebSocket connections to route traffic through attacker-controlled infrastructure, enabling continuous monitoring and data theft.

The scope of the problem extends beyond individual users to affect legitimate developers themselves.

Attackers have launched targeted phishing campaigns against extension developers, sending fraudulent emails that appear to come from the Chrome Web Store. These communications typically threaten extension removal if immediate action is taken, successfully tricking developers into providing access credentials that allow attackers to upload malicious updates to otherwise trusted extensions.

The technical sophistication of these attacks is particularly concerning, as the malicious extensions employ various methods to evade detection.

Attackers utilize “onreset” event handlers and temporary DOM elements for code execution, whereas some extensions fetch and execute arbitrary scripts from remote servers. The compromises have persisted undetected for up to 18 months in some cases, targeting specific user bases such as banking customers and cryptocurrency users.

The impact of these attacks has been substantial, with a single campaign affecting 33 unique extensions and potentially exposing millions of users’ sensitive information, including banking credentials and enterprise access tokens.

The ability of attackers to push malicious updates through official channels has made even cautious users vulnerable to these sophisticated deception campaigns.

You May Also Like

How Hackers Are Outsmarting CFOS With Legit Software in a Global Phishing Blitz

Hackers weaponize legitimate software and AI to empty corporate bank accounts while CFOs remain blind to the terrifying truth. Your business could be next.

Why Public Wi-Fi Might Be the Biggest Cyber Trap You’re Ignoring

Your favorite coffee shop’s Wi-Fi isn’t just serving up free internet – it could be serving your private data to cybercriminals. Learn why 43% of users fall victim.

Elite Finance Executives Hit by Ruthless Global Phishing Scam Masquerading as Rothschild Recruiters

Elite finance executives fall prey to an AI-powered phishing scam that even fools C-suite veterans. Rothschild’s name weaponized in ruthless global attack.

Cybercriminals Hijack OneNote Login Pages to Hijack Office365 and Outlook Accounts

Cybercriminals found a new goldmine: OneNote’s weaker security now lets attackers steal Office365 credentials with frightening ease. Your data might be next.