Holli's IT Blog for Non- IT People

Google Chrome Browser Extensions Hacked!

Written by Holli Houseworth Langford | Jan 9, 2025 4:13:37 PM

 

Google chrome extensions hacked exposing millions of users to data theft. 

This attack was wider spread and has been going on longer than originally thought. In late December it was reported that an ongoing attack aimed at bypassing two-factor authentication protections and targeting Google Chrome users was confirmed when a cybersecurity company confirmed that its browser extension had been injected with malicious code. It now appears that at least 35 companies had their Chrome extensions replaced with malware versions. Here’s everything you need to know about the 2FA bypass hack attacks as new information has emerged.

The Google Chrome 2FA Bypass Attack Timeline

A number of compromises involving Google Chrome web browser extensions started in mid-December and continued through the end of December. However, according to a new information, the hackers behind the attacks were apparently testing their methodology and the technology has been used as far back as March 2024, with the domains used to pull it all off registered in November and early December. It has been confirmed that a malicious cyberattack that occurred on Christmas Eve, affecting Cyberhaven's Chrome extension.

The Cyberhaven attack began when an employee was successfully phished, giving the hackers credentials to gain developer access to the Google Chrome Web Store. This enabled them to publish a malicious version of the Chrome extension used by Cyberhaven, which contained code to exfiltrate session cookies and so bypass 2FA protections for anyone who fell victim. The attack started on Dec. 24 and was discovered late on Dec. 25 when the extension was removed within 60 minutes. This underlies the dangers of phishing emails and the importance of training and testing employees. Also, having the tight security tools put in place. Unfortunately, tools can only do so much when someone lets someone in through a phishing attack.

New Details About Google Chrome 2FA Bypass Attack Methods

According to Forbes magazine, the 2FA bypass Chrome hack attack appears to have compromised at least 35 browser extensions, with some 2.6 million users potentially impacted. The hack seems to have started against the targeted extension developers on Dec. 5, with what developers are calling a sophisticated phishing email. Seemingly coming from possible Chrome Web Store domains (they were, of course, all fake) and detailing a Chrome extension policy violation. 

The Rising Threat to Chrome Users: Extension Hacks

Google Chrome, a popular web browser, offers a variety of extensions. These tools enhance functionality and user experience. However, recent incidents have raised concerns. Some Google Chrome extensions were hacked, exposing users to potential data theft. This breach has affected countless users worldwide. It has put their personal and financial information at risk. Chrome extensions have become essential for many users. They offer convenience by performing tasks directly in the browser. However, this also makes them attractive targets for cybercriminals. In recent years, the rise in extension hacks has been alarming. Cybercriminals often exploit vulnerabilities in these extensions. This leads to unauthorized access to users' private information. One prominent method involves malware-laden updates. Once an extension developer is compromised, hackers can push malicious updates to users. This compromises security without user knowledge. Permissions requested by extensions also present risks. Many extensions demand access to sensitive data. Users, eager for features, often approve these requests without hesitation. The numbers are staggering. Thousands of users might be affected in a single breach. Such hacks expose them to various threats, including identity theft and financial fraud. Consequently, users must remain vigilant and prioritize cybersecurity. Awareness is the first line of defense against these rising threats.

Understanding the Impact of Compromised Chrome Extensions

When Chrome extensions get hacked, the repercussions can be severe. Users often remain oblivious to the ongoing breach. This lack of awareness contributes to prolonged exposure to risks. Sensitive data is often at stake during these breaches. Such data can include browsing history, login credentials, and personal information. Exposing this information can lead to serious consequences. The implications of these breaches extend further. Users can face financial theft, and reputations can be damaged. Additionally, identity theft becomes a real threat.

Below is a list of potential impacts:

  • Unauthorized access to financial accounts
  • Misuse of personal or sensitive information
  • Indirect threats to connected accounts and networks

These impacts highlight the severity of compromised extensions. Therefore, users need to understand the risks. Recognizing the potential consequences can help in taking appropriate actions. Ultimately, users must prioritize security to safeguard their personal data.

Identifying and Avoiding Malicious Chrome Extensions

Spotting harmful extensions requires vigilance. Always inspect the developer's credibility before installation. Check reviews and ratings for any red flags from past users. Permissions requested by extensions can be revealing. Legitimate extensions typically ask for minimal, relevant access. Overreaching permissions, like access to personal data, can be a red flag. A careful audit of your current extensions is also vital. Regularly review and remove any extensions you no longer use. This limits potential vulnerabilities in your browser.

Here's how to stay cautious:

  • Check developer reputation and extension reviews.
  • Analyze permissions for any unnecessary access.
  • Regularly audit and uninstall unused extensions.

Keeping Your Chrome Extensions Secure: Best Practices

Maintaining the security of your Chrome extensions is crucial. Start with ensuring extensions are regularly updated to the latest versions. Updates often contain patches for known vulnerabilities. Keeping your browser updated is equally important. New browser versions typically improve security protocols and defend against emerging threats. A secure browser complements secure extensions. Limiting the number of installed extensions also helps. Each extension adds potential entry points for security breaches. Aim for a minimalistic approach to increase security. Consider using security extensions designed to bolster browsing safety. These can alert you to suspicious behaviors or potential threats. They provide an additional layer of protection beyond regular extensions.

To sum up, follow these best practices:

  • Keep extensions and Chrome up to date.
  • Limit the number of installed extensions.
  • Utilize dedicated security extensions.

By adhering to these guidelines, you can significantly enhance your online safety and minimize risks.

Google's Response and Measures for Enhanced Security

In light of the recent extension hacks, Google swiftly acted. They removed the compromised extensions from their Web Store. This immediate removal helped protect numerous unsuspecting users from further data breaches. Google is also reinforcing its security measures. They are implementing stricter vetting processes for new extensions. This ensures that only secure extensions remain available to users. Additionally, Google has increased investment in machine learning. These technologies aim to identify potential threats more quickly. By leveraging AI, Google enhances its ability to catch suspicious activity early on.

But even with all of this, security is still a user's responsibility. Studies show that around 88%- 95% of data breaches are still caused by human error. Users need to assume they are under attack and keep their guards up. Organizations should be phish training and testing their staff. 

This attack shows that all companies are at risk for cybersecurity threats no matter the size, their budget or their industry. Even cybersecurity companies are not bullet proof.

How Can We Help?

We are a leading cybersecurity provider for Ohio businesses. If you are concerned and want to make sure your data hasn't been compromised, we can start by looking for vulnerabilities in your systems and network. By conducting a network security audit we will find anything malicious that immediately needs removed and remediated. From there we can see where the gaps are and suggest a plan to secure your network. 

We offer a full range of cybersecurity services and can tailor what we provide to your budget, compliance needs and any other factors that come into play.

  • Complete Network Security Audit
  • Advanced Threat Detection 
  • Phish Training and Testing 
  • Proactive Monitoring and Risk Remediation
     

If you would like the piece of mind knowing that your organization is secure, book a call with us. We can discuss your risk and what we can do for you.