16 Chrome Extensions Hacked: Over 600,000 Users Exposed to Data Theft and Credential Breaches

Dec 30, 2024

In a recent cyberattack, threat actors compromised 16 legitimate Chrome browser extensions, exposing over 600,000 users to data theft and credential exposure.

16 Chrome Extensions Hacked: Over 600,000 Users Exposed to Data Theft and Credential Breaches Summary

Attack Vector and Methodology

The attackers employed phishing campaigns targeting extension publishers, masquerading as official communications from Google Chrome Web Store Developer Support. These deceptive emails falsely claimed policy violations, urging recipients to grant permissions to a malicious OAuth application named "Privacy Policy Extension." Once access was obtained, the threat actors injected malicious code into the extensions, enabling the theft of cookies and user access tokens.

Notable Compromised Extensions

Among the affected extensions were:

  • Cyberhaven Data Loss Prevention Extension: Compromised on December 24, with a malicious version active for approximately 25 hours before remediation.

  • Internxt VPN: A virtual private network service extension.

  • VPNCity: Another VPN service provider's extension.

  • Uvoice: An extension associated with voice services.

  • ParrotTalks: Details about this extension are limited.

Indicators of Compromise (IoCs)

The malicious extensions communicated with a command-and-control (C&C) server hosted on the domain cyberhavenext[.]pro. Security researchers identified additional domains resolving to the same IP address, indicating a broader network of compromised extensions.

Recommendations for Users

Users who have installed any of the compromised extensions should:

  1. Uninstall the Affected Extensions: Remove the compromised extensions immediately to prevent further data exposure.

  2. Change Credentials: Update passwords for accounts that may have been accessed during the period the malicious extensions were active.

  3. Monitor Account Activity: Keep an eye on account statements and activities for any unauthorized actions.

Recommendations for Developers

Extension developers are advised to:

  • Enhance Security Measures: Implement robust security protocols to safeguard against phishing attacks and unauthorized access.

  • Regularly Audit Extensions: Conduct frequent security audits of extensions to detect and address vulnerabilities promptly.

Conclusion

This incident underscores the critical need for vigilance among both users and developers regarding browser extension security. Ensuring the integrity of extensions and being cautious of unexpected communications can significantly mitigate the risk of such compromises.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025
HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025
HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025
HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025

HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025

HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025

HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025

HackerOne Data Breach via Salesforce-Drift Integration: Technical Breakdown 2025

Sep 11, 2025

CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks
CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks
CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks
CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks

CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks

CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks

CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks

CISA Flags WhatsApp Zero-Day Vulnerability Exploited in Zero-Click Spyware Attacks

Sep 4, 2025

Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales
Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales
Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales
Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales

Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales

Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales

Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales

Jaguar Land Rover Cyberattack 2025: IT Shutdown Halts Production and Sales

Sep 3, 2025

WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users
WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users
WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users
WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users

WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users

WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users

WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users

WhatsApp Fixes Zero-Click Spyware Exploit Targeting Apple iPhone and Mac Users

Sep 1, 2025

New Android Malware Masquerades as FSB Antivirus to Spy on Executives
New Android Malware Masquerades as FSB Antivirus to Spy on Executives
New Android Malware Masquerades as FSB Antivirus to Spy on Executives
New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

Aug 25, 2025

DaVita has confirmed a ransomware attack impacting 2.7 million patients, exposing sensitive lab and medical data. Learn about the breach details, financial impact, and security response.
DaVita has confirmed a ransomware attack impacting 2.7 million patients, exposing sensitive lab and medical data. Learn about the breach details, financial impact, and security response.
DaVita has confirmed a ransomware attack impacting 2.7 million patients, exposing sensitive lab and medical data. Learn about the breach details, financial impact, and security response.
DaVita has confirmed a ransomware attack impacting 2.7 million patients, exposing sensitive lab and medical data. Learn about the breach details, financial impact, and security response.

Ransomware Attack on DaVita Exposes Data of 2.7 Million Patients

Ransomware Attack on DaVita Exposes Data of 2.7 Million Patients

Ransomware Attack on DaVita Exposes Data of 2.7 Million Patients

Ransomware Attack on DaVita Exposes Data of 2.7 Million Patients

Aug 22, 2025

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.