16 Chrome Extensions Hacked: Over 600,000 Users Exposed to Data Theft and Credential Breaches

Dec 30, 2024

In a recent cyberattack, threat actors compromised 16 legitimate Chrome browser extensions, exposing over 600,000 users to data theft and credential exposure.

16 Chrome Extensions Hacked: Over 600,000 Users Exposed to Data Theft and Credential Breaches Summary

Attack Vector and Methodology

The attackers employed phishing campaigns targeting extension publishers, masquerading as official communications from Google Chrome Web Store Developer Support. These deceptive emails falsely claimed policy violations, urging recipients to grant permissions to a malicious OAuth application named "Privacy Policy Extension." Once access was obtained, the threat actors injected malicious code into the extensions, enabling the theft of cookies and user access tokens.

Notable Compromised Extensions

Among the affected extensions were:

  • Cyberhaven Data Loss Prevention Extension: Compromised on December 24, with a malicious version active for approximately 25 hours before remediation.

  • Internxt VPN: A virtual private network service extension.

  • VPNCity: Another VPN service provider's extension.

  • Uvoice: An extension associated with voice services.

  • ParrotTalks: Details about this extension are limited.

Indicators of Compromise (IoCs)

The malicious extensions communicated with a command-and-control (C&C) server hosted on the domain cyberhavenext[.]pro. Security researchers identified additional domains resolving to the same IP address, indicating a broader network of compromised extensions.

Recommendations for Users

Users who have installed any of the compromised extensions should:

  1. Uninstall the Affected Extensions: Remove the compromised extensions immediately to prevent further data exposure.

  2. Change Credentials: Update passwords for accounts that may have been accessed during the period the malicious extensions were active.

  3. Monitor Account Activity: Keep an eye on account statements and activities for any unauthorized actions.

Recommendations for Developers

Extension developers are advised to:

  • Enhance Security Measures: Implement robust security protocols to safeguard against phishing attacks and unauthorized access.

  • Regularly Audit Extensions: Conduct frequent security audits of extensions to detect and address vulnerabilities promptly.

Conclusion

This incident underscores the critical need for vigilance among both users and developers regarding browser extension security. Ensuring the integrity of extensions and being cautious of unexpected communications can significantly mitigate the risk of such compromises.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

New Android Malware Masquerades as FSB Antivirus to Spy on Executives
New Android Malware Masquerades as FSB Antivirus to Spy on Executives
New Android Malware Masquerades as FSB Antivirus to Spy on Executives
New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

New Android Malware Masquerades as FSB Antivirus to Spy on Executives

Aug 25, 2025

DaVita has confirmed a ransomware attack impacting 2.7 million patients, exposing sensitive lab and medical data. Learn about the breach details, financial impact, and security response.
DaVita has confirmed a ransomware attack impacting 2.7 million patients, exposing sensitive lab and medical data. Learn about the breach details, financial impact, and security response.
DaVita has confirmed a ransomware attack impacting 2.7 million patients, exposing sensitive lab and medical data. Learn about the breach details, financial impact, and security response.
DaVita has confirmed a ransomware attack impacting 2.7 million patients, exposing sensitive lab and medical data. Learn about the breach details, financial impact, and security response.

Ransomware Attack on DaVita Exposes Data of 2.7 Million Patients

Ransomware Attack on DaVita Exposes Data of 2.7 Million Patients

Ransomware Attack on DaVita Exposes Data of 2.7 Million Patients

Ransomware Attack on DaVita Exposes Data of 2.7 Million Patients

Aug 22, 2025

Warlock Ransomware Exploits Unpatched SharePoint Servers in Global Attacks
Warlock Ransomware Exploits Unpatched SharePoint Servers in Global Attacks
Warlock Ransomware Exploits Unpatched SharePoint Servers in Global Attacks
Warlock Ransomware Exploits Unpatched SharePoint Servers in Global Attacks

Warlock Ransomware Exploits Unpatched SharePoint Servers in Global Attacks

Warlock Ransomware Exploits Unpatched SharePoint Servers in Global Attacks

Warlock Ransomware Exploits Unpatched SharePoint Servers in Global Attacks

Warlock Ransomware Exploits Unpatched SharePoint Servers in Global Attacks

Aug 21, 2025

Workday Confirms Data Breach Linked to Salesforce Social Engineering Attacks
Workday Confirms Data Breach Linked to Salesforce Social Engineering Attacks
Workday Confirms Data Breach Linked to Salesforce Social Engineering Attacks
Workday Confirms Data Breach Linked to Salesforce Social Engineering Attacks

Workday Confirms Data Breach Linked to Salesforce Social Engineering Attacks

Workday Confirms Data Breach Linked to Salesforce Social Engineering Attacks

Workday Confirms Data Breach Linked to Salesforce Social Engineering Attacks

Workday Confirms Data Breach Linked to Salesforce Social Engineering Attacks

Aug 19, 2025

Windows 11 24H2 Security Update (KB5063878) Triggers SSD/HDD Failures and Data Corruption
Windows 11 24H2 Security Update (KB5063878) Triggers SSD/HDD Failures and Data Corruption
Windows 11 24H2 Security Update (KB5063878) Triggers SSD/HDD Failures and Data Corruption
Windows 11 24H2 Security Update (KB5063878) Triggers SSD/HDD Failures and Data Corruption

Windows 11 24H2 Update (KB5063878) Causes SSD Failures and Data Loss

Windows 11 24H2 Update (KB5063878) Causes SSD Failures and Data Loss

Windows 11 24H2 Update (KB5063878) Causes SSD Failures and Data Loss

Windows 11 24H2 Update (KB5063878) Causes SSD Failures and Data Loss

Aug 18, 2025

Royal Enfield Ransomware Attack 2025: Zero-Day Exploit Wipes Backups, Halts Operations

Royal Enfield Ransomware Attack 2025: Zero-Day Exploit Wipes Backups, Halts Operations

Royal Enfield Ransomware Attack 2025: Zero-Day Exploit Wipes Backups, Halts Operations

Royal Enfield Ransomware Attack 2025: Zero-Day Exploit Wipes Backups, Halts Operations

Aug 14, 2025

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.