Hackers may have modified several Chrome extensions with malicious code this month after gaining access to administrator accounts via a phishing campaign. Cybersecurity company Cyberhaven shared in a this weekend, its Chrome extension was compromised on December 24 in an attack that appeared to “target connections to specific social advertising and AI platforms.” A few other extensions were also affected, dating back to mid-December, reported. According to Nudge Security which includes ParrotTalks, Uvoice and VPNCity.
Cyberhaven informed its customers on December 26 in an email seen by who advised them to revoke and rotate their passwords and other credentials. The company’s initial investigation into the incident revealed that the malicious extension targeted Facebook Ads users, aiming to steal data such as access tokens, user IDs and other account information, as well as cookies. The code also added a mouse click listener. “After successfully sending all data to the [Command & Control] server, the Facebook user ID is saved in the browser storage,” Cyberhaven said in its analysis. “This user ID is then used in mouse click events to help attackers with 2FA on their side should that be necessary.”
Cyberhaven said it first detected the flaw on December 25 and was able to remove the malicious version of the extension within an hour. A clean version has since been released.