Google Chrome Extensions Hack | Neuways – Technologist
New revelations have surfaced about a significant cyber attack involving Google Chrome extensions. The attack affected approximately 400,000 users and exposed vulnerabilities in the cyber security firm Cyberhaven. Initially believed to have started in mid-December 2024, it is now suspected to have originated as part of a more extensive campaign planned as early as March 2024. This discovery of the Google Chrome Extensions hack underscores the importance of robust cyber security practices and the evolving tactics employed by threat actors.
Nature of the Attack
A thorough investigation by BleepingComputer uncovered that malicious code was embedded in at least 35 Google Chrome extensions, reaching around 2.6 million users. The attack led to the installation of malware on approximately 400,000 devices through compromised Cyberhaven extensions.
The attack’s entry point was a phishing email targeting a developer disguised as an official Google notification. The email falsely claimed the developer’s extension violated Chrome Web Store policies and risked removal. It urged the developer to install a ‘Privacy Policy Extension,’ which granted the attackers unauthorised permissions.
This action enabled creating and deploying a malicious version of the extension, bypassing Google’s security measures and leveraging Chrome’s automatic update feature to spread the compromised software.
Timeline of Events
Evidence suggests that the attackers registered command-and-control subdomains as early as March 2024, indicating a well-planned operation. Additional domains were registered and tested in November and December 2024, leading up to the launch of the malicious campaign on December 5. This timeline highlights the persistent efforts of cybercriminals to refine their methods and evade detection.
Targeted Data
The attackers’ primary objective was to collect Facebook user data through the compromised extensions. This included sensitive information that could potentially be exploited for further phishing campaigns or identity theft. The scale of the operation and the use of advanced techniques demonstrate the increasing sophistication of cyber threats.
Implications and Recommendations
This incident highlights the critical need for heightened vigilance in managing extensions and third-party applications. Organisations must adopt stringent security measures, including:
- Regular audits of browser extensions to identify and remove unauthorised or outdated software.
- Enhanced phishing awareness training to reduce the risk of social engineering attacks.
- Implementation of robust endpoint protection and monitoring solutions.
- Leveraging advanced tools to detect and block malicious domain registrations.
Cyber security incidents like the Google Chrome Extensions hack underline the importance of proactive defence mechanisms. Contact Neuways today for expert guidance on securing your organisation’s digital environment.
Neuways specialises in safeguarding businesses against evolving cyber threats and ensuring their IT infrastructure remains resilient.
Related Posts

How to Find Competitor Backlinks? Complete Guide – Technologist

Insanony Instagram Viewer – Everything You Need to Know – Technologist

IT Support Issues Caused Disruption In Cornwall – Technologist
About The Author
admin
Azeem Rajpoot, the author behind Technolo Gist, is a passionate tech enthusiast with a keen interest in exploring and sharing insights about the rapidly evolving world of technology. With a background in Technologist, Azeem brings a unique perspective to the blog, offering in-depth analyses, reviews, and thought-provoking articles. Committed to making technology accessible to all, Azeem strives to deliver content that not only keeps readers informed about the latest trends but also sparks curiosity and discussions. Follow Azeem on this exciting tech journey to stay updated and inspired.