Technology

Major Supply Chain Attack Targets Popular Chrome Extensions—Millions at Risk!

2025-01-22

Author: Ming

A recent warning from cybersecurity firm Sekoia has sent shockwaves through the Chrome user community, revealing a sophisticated supply chain attack that has already impacted hundreds of thousands of users globally. This alarming breach has compromised numerous Chrome extension developers, exposing sensitive data such as API keys, session cookies, and authentication tokens from widely used platforms like ChatGPT and Facebook for Business.

According to Sekoia's investigation, the vulnerabilities exploited in this extensive phishing campaign have been traced back to similar threats dating as far back as early 2023, demonstrating an alarming trend in cybercriminal activity. The latest known instance of this campaign took place on December 30, 2024, pointing to an ongoing threat to online security.

One key victim of this attack was California-based Cyberhaven, a company specializing in cloud-based data protection solutions. After detecting the breach during the post-Christmas period, widespread media coverage highlighted the incident and its implications for user security. Booz Allen Hamilton, in its follow-up analysis, corroborated Cyberhaven's findings, indicating that the campaign affected numerous other extensions—putting millions of users at risk.

As the investigation unfolded, many of the compromised extensions were pulled from the Chrome Web Store, while others displayed updates that did not mention the incidents. Nonetheless, few developers publicly acknowledged the attacks, leaving users unaware of the risks.

Notably, Ryzal Yusoff, the founder of the Reader Mode extension, bravely addressed approximately 300,000 users in an open letter regarding a breach that occurred on December 5. Yusoff explained that his team’s developer account was compromised through a phishing email imitating official communications from the Chrome Web Store. This breach permitted attackers to upload malicious versions of the Reader Mode extension which might have contained harmful scripts aimed at collecting user data. Users who updated their extensions between December 7 and December 20, 2024, were particularly vulnerable.

Adding to the chaos, Jaime Blasco, co-founder and CTO of Nudge Security, identified several extensions he believed had also been compromised, echoing findings from Booz Allen Hamilton’s report.

The attackers employed clever tactics to lull developers into a false sense of security. By impersonating Chrome Web Store Developer Support, they targeted dev teams with sophisticated phishing emails that warned of potential extension removals due to fictitious policy violations. This tactic included links that led unsuspecting developers to legitimate Google Accounts pages, where they inadvertently granted permission to a malicious OAuth application.

The researchers indicated it is likely that the attackers harvested developer email addresses from the Chrome Web Store, indicating another layer of vulnerability in the system.

Sekoia researchers utilized two domains linked to the phishing emails to identify other domain names involved in the campaign. Their investigation revealed that these domains were hosted on just two IP addresses, highlighting an organized effort behind the cyberattacks. Using passive DNS resolutions, Sekoia uncovered a range of domains thought to be compromised.

"The consistent use of the same registrar (Namecheap) and the similar DNS setups facilitated our investigation," Sekoia explained in their blog post. They suspect that the attacker’s campaigns have been running since at least December 2023, utilizing techniques like SEO poisoning to promote malicious Chrome extensions.

As reports confirm that the attackers have shifted their focus from creating their own malicious extensions to compromising legitimate ones, the cautionary tale stands as a stark reminder of the persistent threat lurking in the digital world. Chrome users are urged to remain vigilant, keep their extensions updated, and actively monitor their browser activity to protect against potential breaches.

Stay informed and guard your data—this cyber threat is far from over!