Over 100 Chrome extensions in Web Store target users accounts and data
嗯,用户让我用中文总结一下这篇文章,控制在100字以内,而且不需要特定的开头。我得先仔细阅读文章内容,抓住关键点。 文章主要讲的是Chrome商店里有超过100个恶意扩展程序,它们试图窃取Google的OAuth2令牌,安装后门,并进行广告欺诈。这些扩展是由一个威胁行为者发布的,使用相同的C2基础设施,并且分布在多个类别中,比如Telegram客户端、游戏、视频增强工具等。 研究者发现这些恶意软件可能与俄罗斯的MaaS有关,通过中央后端服务器进行数据收集和账户劫持。此外,这些扩展还注入HTML代码、窃取用户数据,并且有一个特别严重的扩展可以每15秒窃取Telegram会话信息。 最后,Socket已经通知了Google,但这些恶意扩展仍然在Chrome商店里。建议用户检查并卸载可疑的扩展。 总结的时候要简洁明了,涵盖恶意扩展的数量、目的、发布者、涉及类别以及影响范围。确保不超过100字。 </think> 超过100款恶意Chrome扩展程序试图窃取Google OAuth2令牌、植入后门并实施广告欺诈。这些扩展由同一威胁行为者发布,在多个类别中伪装成正常工具。研究人员发现其与俄罗斯恶意软件即服务(MaaS)相关,并警告称这些恶意程序仍存在于Chrome商店中。 2026-4-14 20:46:51 Author: www.bleepingcomputer.com(查看原文) 阅读量:10 收藏

Over 100 Chrome extensions in Web Store target users accounts and data

More than 100 malicious extensions in the official Chrome Web Store are attempting to steal Google OAuth2 Bearer tokens, deploy backdoors, and carry out ad fraud.

Researchers at application security company Socket discovered that the malicious extensions are part of a coordinated campaign that uses the same command-and-control (C2) infrastructure.

The threat actor published the extensions under five distinct publisher identities in multiple categories: Telegram sidebar clients, slot machine and Keno games, YouTube and TikTok enhancers, a text translation tool, and utilities.

Wiz

According to the researchers, the campaign uses a central backend hosted on a Contabo VPS, with multiple subdomains handling session hijacking, identity collection, command execution, and monetization operations.

Socket has found evidence indicating a Russian malware-as-a-service (MaaS) operation, based on comments in the code for authentication and session theft.

Extensions linked to the same campaign
Extensions linked to the same campaign
Source: Socket

Harvesting data and hijacking accounts

The largest cluster, comprising 78 extensions, injects attacker-controlled HTML into the user interface via the ‘innerHTML’ property.

The second-largest group, with 54 extensions, uses ‘chrome.identity.getAuthToken’ to collect the victim’s email, name, profile picture, and Google account ID.

They also steal the Google OAuth2 Bearer token, a short-lived access token that permits applications to access a user's data or to act on their behalf.

Google account data harvesting
Google account data harvesting
Source: Socket

A third batch of 45 extensions features a hidden function that runs on browser startup, acting as a backdoor that fetches commands from the C2 and can open arbitrary URLs. This function does not require the user to interact with the extension.

One extension highlighted by Socket as “the most severe” steals Telegram Web sessions every 15 seconds, extracts session data from ‘localStorage’ and the session token for Telegram Web, and sends the info to the C2.

“The extension also handles an inbound message (set_session_changed) that performs the reverse operation: it clears the victim's localStorage, overwrites it with threat actor-supplied session data, and force-reloads Telegram,” describes Socket.

“This allows the operator to swap any victim's browser into a different Telegram account without the victim's knowledge.”

The researchers also found three extensions that strip security headers and inject ads into YouTube and TikTok, one that proxies translation requests through a malicious server, and a non-active Telegram session theft extension that uses staged infrastructure.

Socket has notified Google about the campaign, but warns that all malicious extensions are still available on the Chrome Web Store at the time of publishing their report.

BleepingComputer confirms that many of the extensions listed in Socket’s report are still available at publishing time. We have reached out to Google for a comment on this, but we have not heard back.

Users are recommended to search their installed extensions against the IDs Socket published, and uninstall any matches immediately.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data/
如有侵权请联系:admin#unsafe.sh