Blumer Tech
  • Tech News
  • Business
  • Stock
  • Politics
Tech News

Hackers hijacked legitimate Chrome extensions to try to steal data

by December 29, 2024
December 29, 2024
Illustration by Carlo Cadenas / The Verge

A cyberattack campaign inserted malicious code into multiple Chrome browser extensions as far back as mid-December, Reuters reported yesterday. The code appeared designed to steal browser cookies and authentication sessions, targeting “specific social media advertising and AI platforms,” according to a blog post from Cyberhaven, one of the companies that was targeted.

Cyberhaven blames a phishing email for the attack, writing in a separate technical analysis post that the code appeared to specifically target Facebook Ads accounts. According to Reuters, security researcher Jaime Blasco believes the attack was “just random” and not targeting Cyberhaven specifically. He posted on X that he’d found VPN and AI extensions that contained the same malicious code that was inserted into Cyberhaven.

Other extensions possibly affected include Internxt VPN, VPNCity, Uvoice, and ParrotTalks, as Bleeping Computer writes.

Our team has confirmed a malicious cyberattack that occurred on Christmas Eve, affecting Cyberhaven’s Chrome extension. Here’s our post about the incident and the steps we’re taking: https://t.co/VTBC73eWda

Our security team is available 24/7 to assist affected customers and…

— Cyberhaven (@CyberhavenInc) December 27, 2024

Cyberhaven says hackers pushed an update (version 24.10.4) of its Cyberhaven data loss prevention extension containing the malicious code on Christmas Eve at 8:32PM ET. Cyberhaven says it discovered the code on December 25th at 6:54PM ET and removed it within an hour, but that the code was active until December 25th at 9:50PM ET. The company says it released a clean version in its 24.10.5 update.

Cyberhaven’s recommendations for companies that may be affected include that they check their logs for suspicious activity and revoke or rotate any passwords not using the FIDO2 multifactor authentication standard. Prior to publishing its posts, the company notified customers via an email that TechCrunch reported Friday morning.

previous post
10 terrific Nintendo Switch games from 2024 to check out
next post
The SwitchBot S10, one of our favorite robovac / mop hybrids, is $500 off

You may also like

Google Maps in the US will change to...

January 28, 2025

Trump says he’ll put tariffs on imported chips...

January 28, 2025

FBI’s warrantless ‘backdoor’ searches ruled unconstitutional

January 28, 2025

Sony reduces OLED burn-in fears with a three-year...

January 28, 2025

Now Apple tells us how to update AirPods

January 28, 2025

DeepSeek: all the news about the startup that’s...

January 28, 2025

The Pebble smartwatch is making a comeback

January 28, 2025

iPhone SE 4 appears in new photos and...

January 27, 2025

Retro Remake opens preorders for its PS One...

January 27, 2025

Netflix won the streaming wars, and we’re all...

January 27, 2025

    Join The Exclusive Subscription Today And Get Premium Articles For Free.


    Your information is secure and your privacy is protected. By opting in you agree to receive emails from us. Remember that you can opt-out any time.

    Tech News

    • Palantir joins list of 20 most valuable U.S. companies, with stock more than doubling in 2025

      July 26, 2025
    • Chart Mania – 23 ATR Move in QQQ – Metals Lead 2025 – XLV Oversold – XLU Breakout – ITB Moment of Truth

      July 26, 2025
    • FCC greenlights Paramount’s $8 billion merger with entertainment group Skydance

      July 25, 2025
    • Microsoft’s Satya Nadella says job cuts have been ‘weighing heavily’ on him

      July 25, 2025
    • S&P 500 Breaking Out Again: What This Means for Your Portfolio

      July 25, 2025
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Copyright © 2025 blumertech.com | All Rights Reserved

    Blumer Tech
    • Tech News
    • Business
    • Stock
    • Politics