These 108 Malicious Chrome Extensions Are Stealing Google and Telegram Data

These 108 Malicious Chrome Extensions Are Stealing Google and Telegram Data

Lifehacker technology

Key Points:

  • Cybersecurity researchers from Socket's Threat Research Team discovered 108 malicious Google Chrome extensions that steal login credentials, user IDs, and browsing data, all controlled by a single operator despite being published under five different developer names.
  • These extensions, collectively installed around 20,000 times, span categories like Telegram sidebar clients, gambling games, YouTube and TikTok enhancers, page utilities, and a text translation tool, all delivering advertised features while secretly running malicious activities.
  • Key malicious behaviors include stealing Telegram Web sessions every 15 seconds, leaking Google account identity details upon sign-in, injecting HTML code, opening arbitrary URLs, and removing security measures on YouTube and TikTok to inject gambling ads.
  • Users are advised to check for these extensions, log out of Telegram Web sessions if affected, review Google third-party app permissions, and exercise caution when installing new extensions, especially those requiring sensitive information or with poor reviews.
  • A complete list of the malicious extensions and their Chrome Extension IDs is available in Socket's report for users to verify and remove compromised extensions.

Trending Business

Trending Technology

Trending Health