After establishing a malicious Google Workspace domain with various user profiles without multi-factor authentication and publishing a seemingly legitimate browser extension on the Chrome Web Store, attackers proceed to lure targets into downloading the extension, according to an analysis from SquareX. Stealthy log-ins to one of the attacker-controlled Workspace profiles performed by the extension will be followed by the opening of the legitimate Chrome support page that prompts targets to activate Chrome sync, which once done enables attackers to access not only all the targeted device's data but also the breached profile.Such access could then be leveraged by attackers to trick victims into installing a fake software update that would allow total browser control. "Unlike previous extension attacks that involve elaborate social engineering, adversaries need only minimal permissions and a small social engineering step, with nearly no user interaction required to execute this attack," said SquareX researchers.
Application security, Cloud Security, Endpoint/Device Security![Google releases emergency patches for eighth Chrome zero-day of 2023](https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/12/chrome-browser-app.jpg)
Novel Chrome extension-exploiting attack facilitates device takeovers
![Google releases emergency patches for eighth Chrome zero-day of 2023](https://image-optimizer.cyberriskalliance.com/unsafe/1920x0/https://files.cyberriskalliance.com/wp-content/uploads/2023/12/chrome-browser-app.jpg)
(Adobe Stock)
BleepingComputer reports that threat actors could covertly hijack devices through the new multi-stage Browser Syncjacking attack that involves a trojanized Chrome extension.
After establishing a malicious Google Workspace domain with various user profiles without multi-factor authentication and publishing a seemingly legitimate browser extension on the Chrome Web Store, attackers proceed to lure targets into downloading the extension, according to an analysis from SquareX. Stealthy log-ins to one of the attacker-controlled Workspace profiles performed by the extension will be followed by the opening of the legitimate Chrome support page that prompts targets to activate Chrome sync, which once done enables attackers to access not only all the targeted device's data but also the breached profile.Such access could then be leveraged by attackers to trick victims into installing a fake software update that would allow total browser control. "Unlike previous extension attacks that involve elaborate social engineering, adversaries need only minimal permissions and a small social engineering step, with nearly no user interaction required to execute this attack," said SquareX researchers.
After establishing a malicious Google Workspace domain with various user profiles without multi-factor authentication and publishing a seemingly legitimate browser extension on the Chrome Web Store, attackers proceed to lure targets into downloading the extension, according to an analysis from SquareX. Stealthy log-ins to one of the attacker-controlled Workspace profiles performed by the extension will be followed by the opening of the legitimate Chrome support page that prompts targets to activate Chrome sync, which once done enables attackers to access not only all the targeted device's data but also the breached profile.Such access could then be leveraged by attackers to trick victims into installing a fake software update that would allow total browser control. "Unlike previous extension attacks that involve elaborate social engineering, adversaries need only minimal permissions and a small social engineering step, with nearly no user interaction required to execute this attack," said SquareX researchers.
An In-Depth Guide to Application Security
Get essential knowledge and practical strategies to fortify your applications.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds