HomeCII/OT16 Google Chrome Extensions Found to be Hijacked – Is Your Browser...

16 Google Chrome Extensions Found to be Hijacked – Is Your Browser Affected?

Published on

spot_img

A recent cybersecurity breach has jeopardized the online security of more than 3.2 million Google Chrome users, as hackers exploited popular browser extensions to inject malicious scripts and manipulate web traffic for fraudulent activities. This cyberattack on Google Chrome extensions, believed to stem from a compromise in the software supply chain, allowed cybercriminals to take advantage of trusted extensions and distribute harmful updates without users’ knowledge.

The incident involved 16 well-known Google Chrome extensions, including ad blockers, emoji keyboards, and screen capture tools, being compromised. Initially appearing legitimate, these extensions were later updated with obfuscated scripts aimed at stealing data, altering HTTP requests, and inserting unauthorized advertisements. Consequently, millions of unsuspecting users unknowingly granted permissions that enabled attackers to control their online activities.

The cybersecurity researchers investigating the attack traced its origins back to compromised developer accounts, where hackers either gained access through phishing schemes or manipulated developers into relinquishing control of their extensions. With this access secured, the attackers were able to push malicious updates through the Chrome Web Store, circumventing traditional security checks.

This cyberattack is reminiscent of previous supply chain breaches, wherein cybercriminals exploit trusted software to distribute malware. Due to the automatic nature of browser extension updates, users had no indication that their trusted tools had been weaponized against them.

Security experts analyzing the affected extensions discovered hidden service worker functionality within them, enabling a range of malicious actions:

– Communication with a remote server upon installation to transmit extension details and a unique identifier.
– Storage of configuration data in local storage, with regular updates pushed by the attackers.
– Injection of malicious scripts into websites to pilfer data and manipulate browser activities.
– Removal of Content Security Policy headers from visited websites, heightening the risk of further malware infections.
– Monitoring of browser sessions to reload tabs and ensure persistence.

The compromised extensions posed numerous risks to users, including the theft of sensitive data like login credentials and browsing history, modification of search engine results to redirect users to malicious or affiliate-linked pages for financial gain, injection of harmful advertisements into websites, and bypassing of browser security settings to facilitate additional malware installation on users’ devices.

Although Google has removed the compromised extensions from the Chrome Web Store, users must manually uninstall them from their browsers. Follow these steps if you have installed any of the affected extensions:

1. Remove suspicious extensions via Chrome settings.
2. Reset browser settings to eliminate any lingering malware.
3. Review saved passwords and accounts for unauthorized access, changing critical passwords and enabling two-factor authentication.
4. Install trusted security software to scan for remaining threats.

To stay safe from malicious extensions:

– Regularly audit installed extensions and remove unused ones.
– Check permissions before installing new extensions.
– Research extensions before downloading, considering recent reviews and security reports.
– Enable browser security features and keep Chrome updated for the latest security patches.

This large-scale cyberattack underscores the inherent risks associated with browser extensions and the ease with which they can be exploited by attackers. By adopting best practices and staying informed about cybersecurity threats, users can mitigate risks and ensure a safer online browsing experience.

Source link

Latest articles

Drift Loses $285 Million in DPRK-Linked Social Engineering Attack

  What Happened Solana-based decentralized exchange Drift confirmed that attackers drained approximately $285 million from...

Cyber Briefing – April 3, 2026 – CyberMaterial

Cybersecurity Updates: Key Developments and Alerts In the latest surge of incidents reported within the...

NCSC Urges Immediate Patching of F5 BIG-IP Vulnerability

Urgent Call to Action for UK Organizations to Address Critical F5 Vulnerability In light of...

Infrastructure Engineer Admits Guilt in Locking 254 Windows Servers at Previous Employer

On April 1, 2026, Daniel Rhyne, a 59-year-old former core infrastructure engineer, faced federal...

More like this

Drift Loses $285 Million in DPRK-Linked Social Engineering Attack

  What Happened Solana-based decentralized exchange Drift confirmed that attackers drained approximately $285 million from...

Cyber Briefing – April 3, 2026 – CyberMaterial

Cybersecurity Updates: Key Developments and Alerts In the latest surge of incidents reported within the...

NCSC Urges Immediate Patching of F5 BIG-IP Vulnerability

Urgent Call to Action for UK Organizations to Address Critical F5 Vulnerability In light of...