Malicious Chrome VPN Extensions Installed 1.5M Times Browsers

In a recent cybersecurity revelation, a highly sophisticated cyber attack campaign has emerged, weaving a web of deceit through malicious web extensions cunningly disguised as VPNs. ReasonLabs, a cybersecurity firm, has discovered online piracy tactics involving hidden web extensions.
The assailants employed a multifaceted strategy, exploiting the allure of pirated game torrents featuring popular titles such as GTA and Assassin's Creed as their primary attack vectors.
Astoundingly, these extensions managed to amass a staggering 1.5 million downloads, catapulting unsuspecting users into a realm of peril.
The malicious activities orchestrated by these insidious extensions are far-reaching.
They include hijacking browser activity and web requests, disabling competing cash-back extensions, and surreptitiously installing additional extensions to amplify their manipulation capabilities.
The potential motives behind this covert operation include collecting user data and injecting intrusive advertisements.
Delving into the technical intricacies of the attack, the Trojan installer embedded within pirated game torrents employs an innovative registry method for forcefully installing these malevolent extensions.
These extensions establish communication channels with command-and-control servers, revealing a disconcerting connection to Russia-based domains upon network analysis.
The ramifications of this cyber onslaught are profound: compromising user privacy, manipulating browsing activity for potential financial gains through cashback manipulation and ad injection, and exposing users to heightened risks of identity theft and other cybercrimes.
Unraveling additional insights, it becomes apparent that the attack campaign specifically targeted Russian-speaking users, employing advanced techniques to circumvent browser security measures.
Swift action was taken by Google, who promptly removed all identified extensions from the Chrome Web Store, underscoring the imperative role platforms play in safeguarding users against such threats.
In the wake of this revelation, users must exercise caution and refrain from downloading content from unofficial sources, particularly pirated files.
Essential precautions include the deployment of robust antivirus and anti-malware software equipped with browser protection.
Users are urged to meticulously review browser extensions before installation, remaining vigilant against potential threats.
The significance of reporting any suspicious activity to relevant authorities cannot be overstated, as collective efforts are essential in combating the ever-evolving landscape of cybercrime.


This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 26 Dec 2023 12:25:15 +0000


Cyber News related to Malicious Chrome VPN Extensions Installed 1.5M Times Browsers

Zcaler ThreatLabz 2024 VPN Risk Report - The growing sophistication of cyberthreats alongside the expansion of remote workforces and cloud technologies have exposed significant vulnerabilities in VPNs. Due to their legacy architecture, VPNs grant overly broad network access once credentials ...
9 months ago Cybersecurity-insiders.com
Fake VPN Chrome extensions force-installed 1.5 million times - Three malicious Chrome extensions posing as VPN infected were downloaded 1.5 million times, acting as browser hijackers, cashback hack tools, and data stealers. According to ReasonLabs, which discovered the malicious extensions, they are spread via ...
1 year ago Bleepingcomputer.com
Mullvad VPN Review: Features, Pricing, Pros & Cons - Visit Mullvad VPN. Mullvad VPN has built a solid reputation for being one of the best privacy-focused VPNs on the market. Visit Mullvad VPN. Mullvad offers a flat rate of €5 or $5.48 per month, regardless of subscription length. If you're looking ...
1 year ago Techrepublic.com
Atlas VPN Free vs. Premium: Which Plan Is Best For You? - When VPN providers offer free versions, you may be inclined to stick with that version. Atlas VPN Free is a lifetime-free version of the Atlas VPN service, which allows users to enjoy VPN services in four locations. In comparison, Atlas VPN Premium ...
1 year ago Techrepublic.com
Cybersecurity Insiders - As the threat landscape rapidly evolves, VPNs cannot provide the secure, segmented access organizations need. The 2023 VPN Risk Report reveals the complexity of today's VPN management, user experience issues, vulnerabilities to diverse cyberattacks, ...
1 year ago Cybersecurity-insiders.com
5 Best VPNs for Travel in 2024 - VPNs are software that encrypt your online activity and adjust your IP address, protecting sensitive company data and allowing you to access geo-restricted content at the same time. In this article, we take a look at the five best VPNs for travelers. ...
11 months ago Techrepublic.com
Google Takes Down Over 50,000 Instances of Malicious Chrome Extensions - Google recently took down over 50,000 Chrome browser extensions after discovering that they were involved in malicious activity. The malicious activity included advertising click fraud, downloading malware, and displaying adware. According to Google, ...
2 years ago Thehackernews.com
5 Best VPNs for Android in 2024 - See details VIsit ProtonVPN. see details Visit CyberGhost VPN. As more Android users rely on their smartphones to surf the web, virtual private networks have become essential tools to help secure your mobile connection, no matter where you are. One ...
1 year ago Techrepublic.com
Google Patches Another Chrome Zero-Day as Browser Attacks Mount - For the fourth time since August, Google has disclosed a bug in its Chrome browser technology that attackers were actively exploiting in the wild before the company had a fix for it. Integer Overflow Bug The latest zero-day, which Google is tracking ...
1 year ago Darkreading.com CVE-2023-6345 CVE-2023-4863 CVE-2023-5217 CVE-2023-28205 CVE-2023-32409 CVE-2023-28204 CVE-2023-32373
6 Best Anonymous VPNs for 2024 - VPNs are primarily used to secure online traffic and help users remain anonymous to avoid targeted ads, hide their location or ensure the security and privacy of their personal data. Though many VPN providers may advertise having a no-logs policy, ...
1 year ago Techrepublic.com
VPN for Your Phone: Key to Global Email Security While Traveling - You'll need to enter the details of your VPN connection, including the VPN name, type, server address, and any required authentication credentials. One essential way to use a VPN is to protect your email communications. A VPN can be side-loaded for ...
1 year ago Securityboulevard.com
Understanding the Complexities of VPNs: Balancing Privacy and Security in the Digital Age - A U.S. traveler in Europe might face restrictions accessing certain paid streaming services available in the U.S., which can be circumvented by a VPN masking the local European IP address, thus granting access to U.S.-based content. While VPNs appear ...
9 months ago Cysecurity.news
Malicious Chrome VPN Extensions Installed 1.5M Times Browsers - In a recent cybersecurity revelation, a highly sophisticated cyber attack campaign has emerged, weaving a web of deceit through malicious web extensions cunningly disguised as VPNs. ReasonLabs, a cybersecurity firm, has discovered online piracy ...
1 year ago Cybersecuritynews.com
Malicious Chrome extensions can spoof password managers in new attack - In SquareX's demonstration, the attackers impersonate the 1Password password manager extension by first disabling the legitimate one using the 'chrome.management' API, or if the permissions aren't available, user interface manipulation tactics to ...
3 days ago Bleepingcomputer.com
AVG Secure VPN vs Surfshark: Which VPN Is Better? - If you've been checking out competitor AVG Secure VPN and are wondering how it stacks up against Surfshark, I've got you covered in this review. I signed up for both VPNs and compared AVG and Surfshark head-to-head to help you decide which one is the ...
8 months ago Techrepublic.com
SquareX Unveils Polymorphic Extensions that Morph Infostealers into Any Browser Extension - Password Managers, Wallets at Risk - In addition to the polymorphic attack, SquareX was also the first to discover and disclose multiple extension-based attacks, including Browser Syncjacking, the Chrome Store consent phishing attack leading to Cyberhaven’s breach and numerous other ...
3 days ago Cybersecuritynews.com
Google Online Security Blog: Sustaining Digital Certificate Security - The Chrome Security Team prioritizes the security and privacy of Chrome's users, and we are unwilling to compromise on these values. The Chrome Root Program Policy states that CA certificates included in the Chrome Root Store must provide value to ...
8 months ago Security.googleblog.com
Google Chrome disables uBlock Origin for some in Manifest v3 rollout - Google continues its rollout of gradually disabling uBlock Origin and other Manifest V2-based extensions in the Chrome web browser as part of its efforts to push users to Manifest V3-based extensions. For those who need more time, Google will let the ...
2 weeks ago Bleepingcomputer.com
ZTNA over VPN Can Be a Good Place to Start Your Zero Trust Journey - Zero-trust network access has become the leading project for organizations looking to adopt zero-trust principles. Gartner predicts that 60% of organizations will be adopting zero trust by 2025,1 so there are lots of zero-trust projects going on. As ...
1 year ago Feeds.fortinet.com
Google Chrome Zero-Day Bug Under Attack, Allows Code Injection - Google has patched a high-severity zero-day bug in its Chrome Web browser that attackers are actively exploiting. The vulnerability, assigned as CVE-2024-0519, is the first Chrome zero-day bug that Google has disclosed in 2024, and the second in the ...
1 year ago Darkreading.com CVE-2024-0519 CVE-2024-0517 CVE-2024-0518 Hunters
New Polymorphic Attack That Mimic Any Chrome Extension Installed On The Browser - This newly discovered “polymorphic extension attack” creates pixel-perfect replicas of legitimate extensions’ icons, HTML popups, and workflows, making it nearly impossible for users to distinguish them from authentic extensions. ...
2 hours ago Cybersecuritynews.com
Save up to $315 on data privacy tools with AdGuard VPN - A virtual private network is a foundational data privacy tool for both professional life and your day-to-day browsing. AdGuard VPN offers one-year, three-year, and five-year subscriptions to cover all of your devices, anywhere in the world. AdGuard ...
1 year ago Bleepingcomputer.com
VSCode extensions with 9 million installs pulled over security risks - Microsoft has removed two popular VSCode extensions, 'Material Theme – Free' and  'Material Theme Icons – Free,' from the Visual Studio Marketplace for allegedly containing malicious code. One of the researchers, Amit Assaraf, says ...
1 week ago Bleepingcomputer.com
Surfshark vs IPVanish: Which VPN Should You Choose? - Surfshark and IPVanish are premium virtual private network services that mask your IP address and internet activity so you can browse privately. In this review, I compare Surfshark and IPVanish based on pricing, speed, features, customer support and ...
8 months ago Techrepublic.com

Cyber Trends (last 7 days)