Close Menu
Innovation Village | Technology, Product Reviews, Business
    Facebook X (Twitter) Instagram
    Tuesday, June 3
    • About us
      • Authors
    • Contact us
    • Privacy policy
    • Terms of use
    • Advertise
    • Newsletter
    • Post a Job
    • Partners
    Facebook X (Twitter) LinkedIn YouTube WhatsApp
    Innovation Village | Technology, Product Reviews, Business
    • Home
    • Innovation
      • Products
      • Technology
      • Internet of Things
    • Business
      • Agritech
      • Fintech
      • Healthtech
      • Investments
        • Cryptocurrency
      • People
      • Startups
      • Women In Tech
    • Media
      • Entertainment
      • Gaming
    • Reviews
      • Gadgets
      • Apps
      • How To
    • Giveaways
    • Jobs
    Innovation Village | Technology, Product Reviews, Business
    You are at:Home»browsers»Hackers inject malicious code into multiple Chrome extensions in recent cyber attack

    Hackers inject malicious code into multiple Chrome extensions in recent cyber attack

    0
    By Tapiwa Matthew Mutisi on December 30, 2024 browsers, Cybercrime, Google, Internet, Report, Technology

    Hackers successfully infiltrated several Chrome extensions this month by injecting malicious code after gaining access to admin accounts through a phishing campaign. The cybersecurity firm Cyberhaven disclosed in a blog post over the weekend that its Chrome extension was compromised on December 24. The attack seemed to be aimed at “targeting logins to specific social media advertising and AI platforms.”

    Reuters reported that several other extensions were also affected, dating back to mid-December. According to Jaime Blasco of Nudge Security, the compromised extensions include ParrotTalks, Uvoice, and VPNCity.

    Regarding the Cyberhaven chrome extension compromise I have reasons to believe there are other extensions affected. Pivoting by the ip address there are more domains created within the same time range resolving to the same ip address as cyberhavenext[.]pro (cont)

    — Jaime Blasco (@jaimeblascob) December 27, 2024

    Cyberhaven informed its customers about the breach on December 26 through an email obtained by TechCrunch. The email advised customers to revoke and rotate their passwords and other credentials. Cyberhaven’s initial investigation revealed that the malicious extension specifically targeted Facebook Ads users, aiming to steal data such as access tokens, user IDs, and other account information, along with cookies. The malicious code also included a mouse click listener.

    Cyberhaven explained in its analysis;

    After successfully sending all the data to the [Command & Control] server, the Facebook user ID is saved to browser storage. That user ID is then used in mouse click events to assist attackers with 2FA on their side if that was needed.

    Cyberhaven first detected the breach on December 25 and managed to remove the malicious version of the extension within an hour. The company has since released a clean version of the extension.

    Antitrust Showdown: US DOJ calls for Google to sell Chrome

    Related

    browsers Chrome Chrome extensions cyberattack Cyberhaven CYbersecurity Extensions Google Hackers Internet Phishing Security Technology
    Share. Facebook Twitter Pinterest LinkedIn Email
    Tapiwa Matthew Mutisi
    • Facebook
    • X (Twitter)
    • LinkedIn

    Tapiwa Matthew Mutisi has been covering blockchain technology, intelligent technologies, cryptocurrency, cybersecurity, telecommunications technology, sustainability, autonomous vehicles, and other topics for Innovation Village since 2017. In the years since, he has published over 4,000 articles — a mix of breaking news, reviews, helpful how-tos, industry analysis, and more. | Open DM on Twitter @TapiwaMutisi

    Related Posts

    IBM Acquires Seek AI, Launches NYC AI Accelerator

    Microsoft Rolls Out Bold New Notepad Update

    Africa 3.0: How Purpose-Led Innovation Is Shaping a New Global Powerhouse

    Leave A Reply Cancel Reply

    You must be logged in to post a comment.

    Copyright ©, 2013-2024 Innovation-Village.com. All Rights Reserved

    Type above and press Enter to search. Press Esc to cancel.