A vast and complex cyber espionage operation has affected tens of thousands of unsuspecting users, exploiting one of the most common tools of browsing.
Recent investigations conducted by security experts have uncovered a well-orchestrated network involving 108 extensions for the Google Chrome browser.
These extensions, which at the time of publication of the research already counted about 20,000 total installations from the Chrome Web Store, have been connected to a single command-and-control infrastructure.
The gravity of the discovery lies in the multitude of fraudulent actions quietly carried out in the background, ranging from unauthorized collection of personal information to direct account compromise.
Reports to remove this software from the official store have already been submitted and processed, but the risk remains high for anyone who has not recently updated or checked their local settings.
The most insidious aspect of this campaign is the ability of the developers to hide the malicious code inside seemingly harmless and everyday applications.
Researchers identified malware disguised as simple text translation tools, virtual gambling games such as slot machines or Keno, utilities to facilitate the management of popular platforms like TikTok and YouTube, or alternative clients for messaging.
This variety of offerings has allowed the criminal network to blend in with the millions of legitimate extensions routinely downloaded by users.
The average user often tends to trust a well-crafted store page and seemingly practical features, forgetting the application soon after installation. Unfortunately, it is precisely because of this distraction that threats manage to operate undisturbed for long periods.
Attack methodologies proved highly sophisticated and diverse across the various programs. A specific group of 54 extensions was programmed to intercept and collect Google account details at the exact moment the victim clicked a login button.
Even more worrying is the case of a component dedicated to Telegram, capable of exfiltrating the data from the active web session every 15 seconds, providing attackers with continuous, real-time access to private conversations.
Meanwhile, another 45 extensions contained hidden instructions capable of forcing the opening of arbitrary web addresses at every Chrome startup, regardless of whether the extension was actually used.
Other programs disabled security protections on well-known sites to inject unwanted ads and external scripts, while a fake translation tool systematically redirected every entered text to the criminals’ servers.
It is essential to inspect the browser to identify and uninstall any suspicious or not strictly necessary software, paying particular attention to social media utilities, small games and translators that requested access to accounts without a valid technical reason.
Anyone who has used Telegram Web having installed dubious extensions should proceed to close all active sessions via the official mobile application.
Similarly, those who logged in via Google using unverified programs should review the security section of their profile, immediately revoking the permissions granted to unknown applications to prevent future identity theft.
Find the list of reported extensions at the source link.
The latest HyperOS 3 is now available for several months and already looks toward the…
Amazon has officially ushered in a new era for smart-home technology in our country with…
YMTC (Yangtze Memory Technologies), leading Chinese manufacturer of NAND flash memories, is pursuing a broad…
Just a few weeks after its debut in China, Lei Jun's company announced Xiaomi Mijia…
In the past few hours the official Xiaomi Global portal published the dedicated page to…
Nothing is going through a particularly positive period, driven by the strong sales of the…