Application security, Cloud Security, Endpoint/Device Security

Novel Chrome extension-exploiting attack facilitates device takeovers

Google releases emergency patches for eighth Chrome zero-day of 2023

BleepingComputer reports that threat actors could covertly hijack devices through the new multi-stage Browser Syncjacking attack that involves a trojanized Chrome extension.

After establishing a malicious Google Workspace domain with various user profiles without multi-factor authentication and publishing a seemingly legitimate browser extension on the Chrome Web Store, attackers proceed to lure targets into downloading the extension, according to an analysis from SquareX. Stealthy log-ins to one of the attacker-controlled Workspace profiles performed by the extension will be followed by the opening of the legitimate Chrome support page that prompts targets to activate Chrome sync, which once done enables attackers to access not only all the targeted device's data but also the breached profile.

Such access could then be leveraged by attackers to trick victims into installing a fake software update that would allow total browser control.

"Unlike previous extension attacks that involve elaborate social engineering, adversaries need only minimal permissions and a small social engineering step, with nearly no user interaction required to execute this attack," said SquareX researchers.

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds