This month, hackers successfully modified several Chrome extensions with malicious code after infiltrating admin accounts through a phishing campaign. According to a blog post by cybersecurity company Cyberhaven, their Chrome extension was compromised on December 24 in an attack aimed at logins for specific social media advertising and AI platforms. Reuters reported that other extensions, including ParrotTalks, Uvoice, and VPNCity, were also targeted in similar attacks starting in mid-December, according to Jaime Blasco of Nudge Security.
Cyberhaven alerted its customers on December 26 via email, recommending immediate revocation and rotation of passwords and other credentials. The company’s investigation revealed that the compromised extension targeted Facebook Ads users, aiming to steal sensitive data like access tokens, user IDs, cookies, and other account information. The malicious code also added a mouse click listener, enabling attackers to handle two-factor authentication (2FA) challenges. “After sending the data to the [Command & Control] server, the Facebook user ID is stored in browser storage and used during mouse click events to assist attackers with 2FA if required,” Cyberhaven explained in its analysis.
The breach was detected by Cyberhaven on December 25, and the company swiftly removed the malicious extension version within an hour. A clean, secure version of the extension has since been deployed.
Apple is set to make its streaming service, Apple TV+, free for all users during…
As technology continues to evolve at an unprecedented pace, staying ahead in the tech industry…
Apple is reportedly developing a new smart doorbell camera with Face ID technology to unlock…
This month has been packed for Google as it ramps up efforts to outshine OpenAI…
OpenAI has been rolling out a series of exciting updates and features for ChatGPT, and…
A financially motivated phishing campaign has targeted around 300 organizations, with over 4,000 spoofed emails…