Widespread cyberattack targets Google Chrome extensions, compromises 2.6 million devices

What just happened? Cybersecurity researchers have uncovered a widespread attack targeting browser extensions in the Chrome Web Store during the holiday season. The campaign affected at least 33 extensions and potentially compromised data from approximately 2.6 million devices. The breach came to light when Cyberhaven, a data loss prevention service, identified malicious code embedded in one of its own extensions.

The attack, which began on Christmas Eve, exploited a vulnerability in the Chrome Web Store’s developer authentication system. Attackers used sophisticated spear-phishing techniques to gain access to the accounts of extension developers, enabling them to upload malicious versions of popular extensions.

Cyberhaven’s extension, designed to prevent users from inadvertently entering sensitive data into emails or websites, was one of the first to be compromised. “Our team has confirmed a malicious cyberattack that occurred on Christmas Eve, affecting Cyberhaven’s Chrome extension,” the company stated. “Public reports suggest this attack was part of a wider campaign targeting Chrome extension developers across a wide range of companies.”

The compromised version of Cyberhaven’s extension, version 24.10.4, was available for 31 hours, from December 25 to December 26. During this period, Chrome browsers with Cyberhaven installed would automatically download and execute the malicious code. Analysis of the extension revealed it was designed to interact with different payloads that were downloaded from a malicious site mimicking Cyberhaven’s official domain.

As researchers delved deeper into the attack, they found that it extended far beyond Cyberhaven. John Tuckner, founder of Secure Annex, a browser extension analysis and management firm, reported that at least 19 other Chrome extensions had been similarly compromised. The attackers employed the same spear-phishing campaign and used custom look-alike domains to issue payloads and harvest authentication credentials.

The collective impact of these compromised extensions is staggering, with an estimated 1.46 million downloads across the 20 affected extensions. This attack is also not an isolated incident. A similar campaign targeted both Chrome and Firefox extensions in 2019, compromising four million devices, including those within networks of major companies like Tesla, Blue Origin, and Symantec.

Further investigation revealed an even more alarming trend. One of the compromised extensions, Reader Mode, had been part of a separate campaign dating back to at least April 2023. This earlier compromise was linked to a monetization code library that collected detailed data on every web visit a browser makes. Tuckner identified 13 Chrome extensions, with a combined 1.14 million installations, that had used this library to collect potentially sensitive data.

The incident has sparked discussions on how to better secure browser extensions. Tuckner suggests one potential solution: organizations could implement a browser asset management list, allowing only selected extensions to run while blocking all others.

Related Content

Apple to update AI feature after BBC issues complaint

Just Eat Takeaway completes Grubhub sale to Wonder for a modest $650M

Hands-on: Asus’ new ROG Flow Z13 gaming tablet with AMD integrated graphics

Leave a Comment