Over 100 Chrome extensions caught stealing user accounts and data

April 15, 20265 min read2 sources
Share:
Over 100 Chrome extensions caught stealing user accounts and data

A wolf in the official henhouse

The perceived safety of official app stores has been challenged once again. Researchers from McAfee's Advanced Threat Research team have uncovered a sprawling malicious campaign operating directly within the Google Chrome Web Store. The investigation, detailed in a December 1st report, identified over 100 extensions that, despite appearing as useful tools, were secretly designed to hijack user accounts, commit ad fraud, and create persistent backdoors in users' browsers. Before their removal by Google, these extensions were downloaded more than 1.6 million times, exposing a vast number of users to significant risk.

The malicious extensions masqueraded as a variety of legitimate applications, including video downloaders, price trackers, screenshot tools, and even security services. Popular-sounding names like "Netflix Party," "FlipShopee - Price Tracker Extension," and "VenomVPN Chrome" were used to lure unsuspecting users into granting them extensive permissions. This campaign highlights a persistent threat vector where attackers abuse user trust in official platforms to distribute malware.

Technical breakdown: The time-bomb and the token thief

The success of this campaign hinged on a clever evasion tactic known as a "time-bomb." The extensions, as submitted to the Chrome Web Store, contained no overtly malicious code. This allowed them to pass Google's automated security scans. The malicious activity would only begin several days after a user installed the extension. This delay was designed to separate the installation event from the attack, making it harder for both users and security systems to identify the source of the problem.

After the designated waiting period, the extension would contact a remote command-and-control (C2) server, such as `api.data-cdn[.]io` or `api.cookie-script[.]com`, to download a second-stage, heavily obfuscated JavaScript payload. This payload contained the true malicious logic.

The primary objective was the theft of Google OAuth2 Bearer tokens. Think of a Bearer token as a temporary, powerful key that grants access to your Google services without needing your password. When you log into an app using your Google account, a token is generated to prove you are authenticated. The malicious JavaScript injected by these extensions would actively monitor all network traffic within the browser. When it detected a request to `https://accounts.google.com/o/oauth2/token`, it would intercept the `Authorization` header containing this valuable token and exfiltrate it to the attackers' C2 server.

With a stolen Bearer token, an attacker can gain direct access to a user's Gmail, Google Drive, Google Photos, and Calendar. This access effectively bypasses traditional password-based security and, in many cases, can even sidestep multi-factor authentication (MFA) that was satisfied when the token was originally issued.

Beyond token theft, the extensions engaged in widespread ad fraud. Using the `chrome.tabs.executeScript` API, they injected code into nearly every website the user visited. This code would generate fraudulent ad clicks, display unwanted pop-ups, and redirect users to affiliate marketing pages, creating a steady revenue stream for the operators. The ability to execute arbitrary code from a C2 server also meant every infected browser was effectively a backdoor, allowing attackers to push new instructions, exfiltrate more data, or potentially deploy other malware at any time.

Impact assessment: From personal data to corporate risk

The impact on the 1.6 million users who installed these extensions is severe. The most immediate threat is a full compromise of their Google account, leading to the theft of sensitive emails, private documents, personal photos, and calendar appointments. This data can be used for identity theft, blackmail, or sold on dark web marketplaces.

While the campaign appeared to target individuals broadly, the implications extend to the corporate world. An employee using a personal device or a personal Chrome profile on a work computer could inadvertently expose company data. If their stolen Google account token provides access to corporate documents in Google Drive or sensitive email threads, it creates a significant data breach risk for their employer. The backdoor functionality further amplifies this threat, as it could be used to pivot from the browser into more sensitive corporate network environments.

Google responded promptly to McAfee's notification and removed the malicious extensions from the Web Store. However, this action does not automatically uninstall the extensions from users' browsers. Anyone who downloaded one of these extensions remains vulnerable until they manually remove it.

How to protect yourself

Protecting yourself from malicious browser extensions requires vigilance and proactive security habits. Official stores provide a layer of security, but as this incident shows, they are not infallible. Follow these actionable steps to secure your browser:

  • Audit your current extensions: The most important first step is to review what you already have installed. Type `chrome://extensions` into your address bar and press Enter. Carefully examine the list. If you see an extension you don't recognize, don't remember installing, or no longer use, remove it immediately.
  • Scrutinize permissions: Before installing any new extension, carefully review the permissions it requests. Be extremely cautious of extensions that ask for broad permissions like "Read and change all your data on the websites you visit." If a simple screenshot tool wants access to all your web data, that's a major red flag.
  • Check developer and reviews: Look for extensions from reputable developers with a long history and a large, positive user base. Read recent reviews, paying special attention to negative ones that might describe unexpected behavior like pop-ups or redirects.
  • Secure your Google account: Regularly visit your Google Account's security page. Review recent security activity and check which third-party apps have access to your account. Revoke access for any services you no longer use or don't recognize.
  • Choose security tools wisely: Some of the malicious extensions pretended to be security tools like VPNs. While these fakes offered no real protection, using a legitimate and independently audited hide.me VPN can encrypt your traffic and enhance your online privacy against other threats.

Ultimately, treat browser extensions like any other software you install on your computer. Apply a healthy dose of skepticism and adhere to the principle of least privilege, granting them only the minimum access required to function.

Share:

// FAQ

What is an OAuth2 Bearer token and why is its theft so dangerous?

An OAuth2 Bearer token is a type of security token that acts like a temporary password or a session key. When you log into a service using your Google account, a token is issued to that service to grant it access without storing your actual password. If an attacker steals this token, they can present it to Google's services (like Gmail or Drive) to gain access to your account, often bypassing multi-factor authentication.

Google removed the extensions from the store. Am I safe now?

Not necessarily. Removing an extension from the Chrome Web Store prevents new users from installing it, but it does not automatically uninstall it from the browsers of users who already have it. You must manually review and remove the malicious extension from your browser by navigating to `chrome://extensions`.

How did these malicious extensions get past Google's security review?

The attackers used a "time-bomb" technique. The initial code in the extension submitted to the store was clean and appeared harmless, allowing it to pass automated checks. The malicious functionality was only activated days after installation, when the extension would contact a remote server to download and execute the harmful code.

How can I check if I have one of these malicious extensions installed?

Go to your Chrome extensions page by typing `chrome://extensions` in your address bar. Carefully review the list of installed extensions. While specific names were cited (like "Netflix Party" or "VenomVPN Chrome"), the best practice is to remove any extension that you do not recognize, no longer need, or that asks for permissions that seem excessive for its stated purpose.

// SOURCES

// RELATED

Kraken extortion attempt highlights the fine line between security research and crime

Cryptocurrency exchange Kraken revealed an extortion attempt after a “researcher” exploited a bug to steal $3M, blurring the line between hacking and

6 min readApr 15

Rockstar Games data leaked online following breach at analytics partner

Data allegedly belonging to Rockstar Games has been leaked by the ShinyHunters gang after a breach at third-party analytics vendor Anodot.

6 min readApr 14

Passport numbers for more than 300,000 leaked during December Eurail data breach

Eurail.com suffered a major data breach, exposing passport numbers and other PII for over 300,000 customers after a hacker exploited an exposed API to

6 min readApr 12

Hims breach exposes the most sensitive kinds of PHI

Telehealth giant Hims & Hers exposed sensitive health data of nearly 400,000 users, creating a severe risk of targeted blackmail, fraud, and extortion

6 min readApr 11