Over 100 Malicious Chrome Extensions Steal Google Tokens, Hijack Telegram Sessions, a
#1
Information 
Quote:Security researchers at Socket have identified over 100 malicious extensions in the Chrome Web Store that are part of a coordinated campaign. These extensions steal Google OAuth2 Bearer tokens, deploy backdoors, and carry out ad fraud. At the time Socket published its report, all affected extensions were still available in the store. Google has not yet responded to requests for comment.

The extensions were published under five different publisher profiles across various categories, including Telegram sidebar clients, slot machine and Keno games, YouTube and TikTok enhancers, a text translation tool, and browser utilities. Socket found evidence in the code indicating the campaign is tied to a Russian malware-as-a-service operation.

What the Malicious Chrome Extensions Do

The campaign operates with a central backend hosted on a Contabo VPS, supported by multiple subdomains that handle session hijacking, identity collection, command execution, and monetization. The largest cluster involves 78 extensions that inject attacker-controlled HTML into the browser interface using the innerHTML property.

Continue Reading...
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Java Runtime Environment 8.0 Update 491
Java Runtime Envir...harlan4096 — 06:55
Mozilla Firefox Browser 150.0
Mozilla Firefox Br...harlan4096 — 06:54
Kaspersky Endpoint Security 14 for Windo...
Kaspersky Endpoint...harlan4096 — 06:52
VirtualBox 7.2.8
VirtualBox 7.2.8 (...harlan4096 — 06:51
Tor Browser 15.0.10
Tor Browser 15.0.1...harlan4096 — 06:48

[-]
Birthdays
Today's Birthdays
avatar (43)bycoPaist
avatar (49)pieloKat
avatar (43)ilyagNeexy
avatar (51)donitascene
Upcoming Birthdays
avatar (51)steakelask
avatar (45)Termoplenka
avatar (51)Toligo

[-]
Online Staff
There are no staff members currently online.

>