Loading . . .
Google Chrome extensions compromised: What occurred and how to protect yourself
Read Time:1 Minute, 43 Second

Google Chrome extensions compromised: What occurred and how to protect yourself

Hackers Target Google Chrome Extensions: What Happened and How to Stay Safe

Several Google Chrome browser extensions were compromised in what appears to be a large-scale phishing attack, resulting in the exposure of user data. This breach could allow hackers to steal user credentials and potentially bypass two-factor authentication (2FA).

Cyberhaven, a cybersecurity company, was the first to report that its extension was impacted by the attack on December 24. The malicious application, “Privacy Policy Extension,” gained the necessary permissions and uploaded a harmful Chrome extension to the Chrome Web Store. Despite undergoing the usual review process, the malicious extension was approved and published.

The cyber attack targeted extension publishers, with a phishing campaign tricking developers into granting access to the hackers. The phishing email claimed that the developer’s extension violated Google’s Developer Program Policies and contained a link that redirected the recipient to a page granting access to a harmful OAuth application.

Once hackers obtained the required permissions, they injected malicious code into legitimate extensions, allowing them to steal session cookies and user tokens. Investigations indicate that the attackers were focused on compromising logins for social media advertising and AI platforms.

At least 26 extensions, including popular tools like AI Assistant-ChatGPT and Gemini for Chrome, have been affected. While Google has yet to release a public statement on the breach, security experts advise taking steps to protect yourself.

What to Do to Secure Your Browser:

  1. Remove Compromised Extensions: If you’ve installed an affected extension, delete it and reinstall the latest version.
  2. Run Antivirus Software: Perform a full system scan to detect and eliminate any malware that could be affecting your browser.
  3. Enable Two-Factor Authentication (2FA): Secure your developer accounts and online services with 2FA, especially with a security key.
  4. Use HTTPS: Ensure you are browsing sites that use HTTPS, which provides enhanced security compared to HTTP.
  5. Minimize Permissions: Limit the permissions granted to extensions, reducing the impact of potential attacks.

If you use Chrome extensions, stay vigilant and regularly review your installed extensions for potential threats.

Pooja Prajapati

I am Pooja Prajapati, a passionate writer specializing in entrepreneurship, technology, and investments. My love for storytelling drives me to create compelling, insightful, and up-to-date content. My mission is to empower my readers by providing them with the resources they need to thrive in the dynamic world of business. Connect with Pooja Prajapati: pooja@founders40.com
Previous post Google’s CEO has indicated that the AI model Gemini will be the company’s “key focus” for 2025
Next post LG introduces the first-ever 5K2K gaming monitor with a flexible display