Chrome Extension - Threats from the latest Chrome extensions


Overview
On December 25, 2024, several forms of attacks were recorded through Google Chrome extensions to infiltrate and steal user information, affecting over 600,000 users. Hackers took control and injected malicious code into these extensions. From analyzing some compromised machines, the main motive of the attack was to target Facebook Advertising accounts.
Main Findings
The nature of malicious Chrome extensions is that they are browser extensions for Google Chrome designed with harmful intent. These extensions may look like useful or harmless applications, but they often contain malicious code to collect personal data, track online activity, display unwanted ads, or even take control of the browser.
Notably, this vulnerability exists and affects the version: Chrome extension version 24.10.4. Additionally, recent reports also note that 16 other Google extensions may be affected in this attack campaign:
AI Assistant - ChatGPT and Gemini for Chrome
Bard AI Chat Extension
GPT 4 Summary with OpenAI
Search Copilot AI Assistant for Chrome
TinaMInd AI Assistant
Wayin AI
VPNCity
Internxt VPN
Vidnoz Flex Video Recorder
VidHelper Video Downloader
Bookmark Favicon Changer
Castorus
Uvoice
Reader Mode
Parrot Talks
Primus
Tackker - online keylogger tool
AI Shop Buddy
Sort by Oldest
Rewards Search Automator
ChatGPT Assistant - Smart Search
Keyboard History Recorder
Email Hunter
Visual Effects for Google Meet
Earny - Up to 20% Cash Back
Where is Cookie?
Web Mirror
ChatGPT App
Hi AI
Web3Password Manager
YesCaptcha assistant
Bookmark Favicon Changer
Proxy SwitchyOmega (V3)
GraphQL Network Inspector
ChatGPT for Google Meet
GPT 4 Summary with OpenAI
Attack Vector
The attacker initially sends a phishing email to the victim with support for Chrome Extension. After clicking on the email, the victim is unknowingly added to a malicious Google OAUTH application called: “Privacy Policy Extension” and inadvertently grants permission to the third-party malicious application. From there, the attacker gains the necessary permissions through the “Privacy Policy Extension” and uploads malicious extensions including 2 files:
worker.js
content.js
Initially recorded file: worker.js is intended to connect with the C&C server and download the configuration from C&C. It will save the configuration to Chrome's local storage. The next step is that it registers listeners to listen for events from content.js and make HTTP calls.
- After the worker.js file runs successfully, the content.js file is called. This is a new file added to the malicious Chrome extension. The main goal of this file is to collect user data for a specific website. This website is part of the C&C received and stored by worker.js. After collecting the data, it sends the data to a malicious website, which is also in the configuration received from the C&C server.
The target websites received from the C&C server are domains related to "*.facebook.com" with specific purposes such as:
Obtaining the Facebook user ID
Retrieving the user's account information (if available) via the Facebook API
Accessing the user's business account (through the Facebook API)
Fetching the user's ad account information (through the Facebook API)
IOCs
Hash Code
- DDF8C9C72B1B1061221A597168f9BB2C2BA09D38D7B3405E1DACE37AF158794
Malicious file
worker.js (0B871BDEE9D8302A48D6D6511228CAF67A08EC60)
content.js (AC5CC8BCC05AC27A8F189134C2E3300863B317FB)
C&C Servers and Malicious IPs
cyberhavenext[.]pro
api.cyberhaven[.]pro
149.28.124[.]84
149.248.2[.]16
Recommendations
To ensure protection against this campaign, organizations should verify Google Chrome extensions and update to version 24.10.5 or newer.
Review and remove unnecessary extensions from the browser and change passwords on Google Chrome.
Conclusion
Taking control and stealing sensitive information from personal or business Facebook accounts is a significant security risk. By reviewing and upgrading to the recommended versions, organizations and individuals can protect sensitive information from being intercepted by malicious actors. Regular updates and security assessments are crucial for maintaining a safe communication environment.
References
Subscribe to my newsletter
Read articles from Lưu Tuấn Anh directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
