Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Jan 20, 2026

A coordinated campaign involving malicious Google Chrome extensions has been discovered targeting enterprise human resources (HR) and enterprise resource planning (ERP) platforms. These extensions masquerade as legitimate productivity or security tools for widely-used services such as Workday, NetSuite, and SAP SuccessFactors, but in reality are engineered to steal authentication tokens, block critical security pages, and enable full session hijacking on compromised enterprise accounts.

The threat was uncovered by cybersecurity researchers at Socket, who identified five distinct malicious Chrome extensions that share identical infrastructure, code patterns, and targeted API endpoints—despite being published under different developer names including databycloud1104 and Software Access. These extensions have collectively been installed more than 2,300 times from the official Chrome Web Store, exposing organizations to credential theft and potential downstream attacks like data exfiltration or ransomware deployment.

Threat Breakdown

Extension Name / Publisher

Approx. Installs

Malicious Capabilities

Data By Cloud 2 (databycloud1104)

~1,000

Cookie exfiltration, blocks security admin pages

Tool Access 11 (databycloud1104)

~Several hundred

Blocks admin pages, DOM manipulation

Other databycloud1104 extensions

Authentication token theft

Software Access

Bidirectional cookie injection (session hijack)

How the Attack Works

  1. Social Engineering & Distribution

The extensions were marketed as useful enterprise add-ons, claiming to enhance productivity, streamline workflows, or improve security controls for HR/ERP administrators. Examples include dashboards for bulk account management or tools purportedly designed to limit access to sensitive features under the pretext of security.

None of the extensions disclosed their malicious behavior in their listings, nor did their privacy policies mention user data collection. Permissions requested looked consistent with enterprise integrations, helping them evade suspicion.

  1. Cookie Theft & Session Hijacking

By continuously extracting authentication cookies named "__session", the extensions captured active session tokens without inputting credentials. These tokens were sent to remote attacker-controlled command-and-control (C2) servers every 60 seconds, enabling persistent unauthorized access—even after users logged out and back in.

One extension (Software Access) went further by implementing bidirectional cookie injection, receiving stolen cookies from the attacker’s server and setting them in the victim’s browser. This allowed attackers to hijack sessions without needing usernames, passwords, or multi-factor authentication codes.

  1. Blocking Incident Response

Two extensions—Tool Access 11 and Data By Cloud 2—used DOM manipulation to block access to critical security and incident response pages within platforms like Workday:

  • Tool Access 11 interfered with access to 44 administrative pages, including authentication policies and session controls.

  • Data By Cloud 2 expanded this to 56 pages, adding password and 2FA device management, security audit logs, and more.
    Blocking such pages could delay or prevent legitimate administrators from responding effectively to breaches.

Impact & Risk

Although installed relatively few times compared to broader malware campaigns, the impact of enterprise credential theft can be significant:

  • Unauthorized access to HR/ERP systems

  • Sensitive employee and financial data exposure

  • Potential for lateral movement and ransomware deployment

  • Interference with incident response workflows

Enterprise credentials are high-value targets; compromised sessions may lead to far more severe breaches across corporate environments.

Mitigation & Response

Socket reported the malicious extensions to Google, and they have been removed from the Chrome Web Store at the time of publishing.

If your organization may have installed any of these extensions, we recommend:

  1. Immediately uninstalling the suspicious extensions from all affected browsers.

  2. Notifying security teams and initiating incident response procedures.

  3. Rotating credentials and resetting passwords for impacted platforms.

  4. Conducting browser extension audits and enforcing stricter policies around approved extensions.

Staying Secure

Attackers increasingly leverage seemingly legitimate applications to gain a foothold within enterprise environments. Browser extension supply chain threats highlight the need for vigilant software vetting, user education, and robust endpoint security practices.

By understanding these tactics and implementing proactive controls, organizations can significantly reduce the risk posed by malicious browser add-ons.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms
Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Malicious Chrome Extensions Steal Credentials From Enterprise HR Platforms

Jan 20, 2026

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability
Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Hackers Actively Exploiting Critical Fortinet FortiSIEM Vulnerability

Jan 19, 2026

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Jan 14, 2026

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

Jan 12, 2026

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Jan 8, 2026

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

Jan 6, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.