{"id":9071,"date":"2020-06-19T21:17:41","date_gmt":"2020-06-19T18:17:41","guid":{"rendered":"https:\/\/forklog.media\/?p=9071"},"modified":"2020-06-23T14:05:54","modified_gmt":"2020-06-23T11:05:54","slug":"google-chrome-extension-with-32m-downloads-has-malicious-add-ons-that-steal-data-report","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/google-chrome-extension-with-32m-downloads-has-malicious-add-ons-that-steal-data-report\/","title":{"rendered":"Google Chrome Extensions With 32M Downloads Have Malicious Add-Ons that Steal Data, Report"},"content":{"rendered":"<p>As of May 2020, Google&#8217;s Chrome Web Store has reportedly been hit with the most massive surveillance campaign so far, which managed to steal data from users around the world through over 32 million downloads of malicious extensions.<\/p>\n<p><!--more--><\/p>\n<p>The attacks were <a href=\"https:\/\/awakesecurity.com\/blog\/the-internets-new-arms-dealers-malicious-domain-registrars\/\">discovered<\/a> by cybersecurity firm Awake Security that claimed a single Internet Domain Registrar: CommuniGal Communication Ltd, or GalComm, facilitated the criminal activities. The firm explained in a dedicated report:<\/p>\n<blockquote><p><b><i>&#8220;GalComm has enabled malicious activity that has been found across more than a hundred networks we\u2019ve examined. Furthermore \u2013 the malicious activity has been able to stay hidden by bypassing multiple layers of security controls, even in sophisticated organizations with significant investments in cybersecurity.&#8221;<\/i><\/b><\/p><\/blockquote>\n<h2>32,962,951 Downloads of Malicious Extensions<\/h2>\n<p>There are 26,079 reachable domains registered through GalComm, with over 15,000 domains being malicious or suspicious, according to the report.<\/p>\n<p>Over the past three months, the researchers found 111 malicious or fake Chrome extensions using GalComm domains for threat actor command and control infrastructure. Once downloaded, those extensions can collect credential tokens stored in cookies or parameters, passwords, take screenshots, and read the clipboard.<\/p>\n<p>As of May 2020, Awake Security detected 32,962,951 downloads of malicious extensions in question. Moreover, the firm <a href=\"https:\/\/www.reuters.com\/article\/us-alphabet-google-chrome-exclusive\/exclusive-massive-spying-on-users-of-googles-chrome-shows-new-security-weakness-idUSKBN23P0JO\">said<\/a> that the extensions\u2019 developers supplied false contact information when they submitted the add-ons to Google.<\/p>\n<p>Also, the extensions were designed so they could skirt detection by antivirus companies or security software. Google ostensibly removed 70 of the malicious extensions from the Chrome Web Store.<\/p>\n<p>In correspondence with Reuters, GalComm owner, Moshe Fogel, <a href=\"https:\/\/www.reuters.com\/article\/us-alphabet-google-chrome-exclusive\/exclusive-massive-spying-on-users-of-googles-chrome-shows-new-security-weakness-idUSKBN23P0JO\">argued<\/a> that \u201cGal\u0421omm is not involved, and not in complicity with any malicious activity whatsoever. You can say exactly the opposite, we cooperate with law enforcement and security bodies to prevent as much as we can.\u201d<\/p>\n<h2>Cyber Attacks Grow in Number<\/h2>\n<p>The number of cyber-attacks has indeed skyrocketed during the time of social unrest. In late May, researchers from cybersecurity firm ESET <a href=\"https:\/\/forklog.com\/en\/latest-modification-of-comrat-trojan-targets-gmail-users-to-steal-confidential-documents\/\">detected a modified version of ComRAT malware<\/a>, which now targets Gmail users to steal confidential documents. In addition to misappropriation of documents, the trojan collects information about the network, Microsoft Windows configurations, and the Archive Directory groups or users.<\/p>\n<p>Threat actors also <a href=\"https:\/\/forklog.com\/en\/cybercriminals-exploit-black-lives-matter-campaign-to-distribute-malware-via-email-amid-social-unrest\/\">began exploiting the Black Lives Matter campaign<\/a> to distribute malware via email, which lures users to open an attached Microsoft Word file to \u201cleave a review confidentially about Black Lives Matter.\u201d Once a user opens the attached file, it initiates the installation of the so-called TrickBot trojan.<\/p>\n<p>The global admiration for Zoom has <a href=\"https:\/\/forklog.com\/en\/zoom-users-fall-victim-to-personal-data-stealing-malware-research-says\/\">brought about bad actors<\/a> taking advantage of it and developing new ways to infect users\u2019 computer systems. Once downloaded and installed, one of the malicious files that mimic the Zoom installer sets up a backdoor that enables criminals to initiate malicious processes remotely.<\/p>\n<p><b>Follow us on <\/b><a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b> and <\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b> and join our <\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b> to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As of May 2020, Google&#8217;s Chrome Web Store has reportedly been hit with the most massive surveillance campaign so far, which managed to steal data from users around the world through over 32 million downloads of malicious extensions.<\/p>\n","protected":false},"author":6,"featured_media":9073,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1111,738,100,1113],"class_list":["post-9071","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity","tag-google","tag-malware","tag-surveillance"],"aioseo_notices":[],"amp_enabled":true,"views":"3812","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=9071"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9071\/revisions"}],"predecessor-version":[{"id":9099,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9071\/revisions\/9099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/9073"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=9071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=9071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=9071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}