Over 100 Malicious Chrome Extensions Steal Google Tokens, Hijack Telegram Sessions, a
#1
Information 
Quote:Security researchers at Socket have identified over 100 malicious extensions in the Chrome Web Store that are part of a coordinated campaign. These extensions steal Google OAuth2 Bearer tokens, deploy backdoors, and carry out ad fraud. At the time Socket published its report, all affected extensions were still available in the store. Google has not yet responded to requests for comment.

The extensions were published under five different publisher profiles across various categories, including Telegram sidebar clients, slot machine and Keno games, YouTube and TikTok enhancers, a text translation tool, and browser utilities. Socket found evidence in the code indicating the campaign is tied to a Russian malware-as-a-service operation.

What the Malicious Chrome Extensions Do

The campaign operates with a central backend hosted on a Contabo VPS, supported by multiple subdomains that handle session hijacking, identity collection, command execution, and monetization. The largest cluster involves 78 extensions that inject attacker-controlled HTML into the browser interface using the innerHTML property.

Continue Reading...
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
XYplorer
What's new in Rele...Kool — 11:44
uBOLite 2026.419.1519 (already available...
uBOLite 2026.419.1...harlan4096 — 09:04
K. STANDARD / PLUS / PREMIUM / KSOS 21.2...
K. STANDARD / PLUS ...harlan4096 — 09:02
Mozilla's MZLA Technologies Launches Thu...
MZLA Technologies,...harlan4096 — 08:43
QOwnNotes
26.4.16  Tag assi...Kool — 12:15

[-]
Birthdays
Today's Birthdays
avatar (44)techlignub
avatar (43)Stevenmam
avatar (50)onlinbah
Upcoming Birthdays
avatar (45)wapedDow
avatar (51)steakelask
avatar (45)Termoplenka
avatar (43)bycoPaist
avatar (49)pieloKat
avatar (43)ilyagNeexy
avatar (51)donitascene
avatar (51)Toligo

[-]
Online Staff
There are no staff members currently online.

>