Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label malicious extensions. Show all posts

Malicious Chrome Extensions Target Enterprise HR and ERP Platforms to Steal Credentials

 

One after another, suspicious Chrome add-ons began appearing under false pretenses - each masquerading as helpful utilities. These were pulled from public view only after Socket, a cybersecurity group, traced them back to a single pattern of abuse. Instead of boosting efficiency, they harvested data from corporate systems like Workday, NetSuite, and SAP SuccessFactors. Installation counts climbed past 2,300 across five distinct apps before takedown. Behind the scenes, threat actors leveraged legitimate-looking interfaces to gain access where it mattered most. 

One investigation found that certain browser add-ons aimed to breach corporate systems, either by capturing login details or disrupting protective measures. Though appearing under distinct titles and author profiles, these tools carried matching coding patterns, operational frameworks, and selection methods - pointing to coordination behind their release. A person using the handle databycloud1104 was linked to four of them; another version emerged through a separate label called Software Access. 

Appearing alongside standard business applications, these extensions asked for permissions typical of corporate tools. One moment they promised better control over company accounts, the next they emphasized locking down admin functions. Positioned as productivity aids, several highlighted dashboard interfaces meant to streamline operations across teams. Instead of standing out, their behavior mirrored genuine enterprise solutions. Claiming to boost efficiency or tighten security, each framed its purpose around workplace demands. Not every feature list matched actual functionality, yet on the surface everything seemed aligned with professional needs. 

Yet the investigation revealed every extension hid its actual operations. Although privacy notices were present, they omitted details about gathering user data, retrieving login information, or tracking admin actions. Without visibility, these tools carried out harmful behaviors - such as stealing authentication cookies, altering webpage elements, or taking over active sessions - all while appearing legitimate. What seemed harmless operated differently beneath the surface. 

Repeated extraction of authentication cookies called "__session" occurred across multiple extensions. Despite user logout actions, those credentials kept reaching external servers controlled by attackers. Access to corporate systems remained uninterrupted due to timed transmissions. Traditional sign-in protections failed because live session data was continuously harvested elsewhere. 

Notably, two add-ons - Tool Access 11 and Data By Cloud 2 - took more aggressive steps. Instead of merely monitoring, they interfered directly with key security areas in Workday. Through recognition of page titles, these tools erased information or rerouted admins before reaching control panels. Pages related to login rules appeared blank or led elsewhere. Controls involving active sessions faced similar disruptions. Even IP-based safeguards vanished unexpectedly. Managing passwords became problematic under their influence. Deactivating compromised accounts grew harder. Audit trails for suspicious activity disappeared without notice. As a result, teams lost vital ground when trying to spot intrusions or contain damage. 

What stood out was the Software Access extension’s ability to handle cookies in both directions. Not only did it take cookies from users, but also inserted ones provided by attackers straight into browsers. Because of this, unauthorized individuals gained access to active sessions - no login details or extra verification steps required. The outcome? Full control over corporate accounts within moments. 

Even with few users impacted, Socket highlighted how compromised business logins might enable wider intrusions - such as spreading ransomware or extracting major datasets. After the discovery, the company alerted Google; soon after, the malicious add-ons vanished from the Chrome Web Store. Those who downloaded them should inform internal security staff while resetting access codes across exposed systems to reduce exposure. Though limited in reach, the breach carries serious downstream implications if left unchecked.

Israeli Researchers Expose Security Flaws in Visual Studio Code Marketplace

 A team of Israeli researchers investigated the security of the Visual Studio Code (VSCode) marketplace and managed to "infect" over 100 organizations by embedding risky code into a popular theme, revealing significant vulnerabilities in the system. 


VSCode, a source code editor developed by Microsoft, is widely used by professional software developers globally. Microsoft also runs an extensions marketplace for VSCode, offering various add-ons to enhance functionality and customization.

Previous reports have identified security gaps in VSCode, such as the ability to impersonate extensions and publishers, and extensions that steal developer authentication tokens. Some extensions have been confirmed to be malicious.

In their experiment, researchers Amit Assaraf, Itay Kruk, and Idan Dardikman created an extension mimicking the 'Dracula Official' theme, a popular dark mode color scheme with over 7 million installs on the VSCode Marketplace. 

The fake extension, named 'Darcula,' used the legitimate Dracula theme’s code but added a script that collected system information such as hostname, installed extensions, device's domain name, and operating system platform, sending this data to a remote server. The researchers registered a matching domain, 'darculatheme.com,' to become a verified publisher, adding credibility to their fake extension.

The malicious code bypassed endpoint detection and response (EDR) tools because VSCode is generally trusted as a development and testing system. "Traditional endpoint security tools (EDRs) do not detect this activity... VSCode is built to read lots of files and execute many commands and create child processes, thus EDRs cannot understand if the activity from VSCode is legit developer activity or a malicious extension," explained Amit Assaraf.

The extension was installed by multiple high-value targets, including a publicly listed company with a $483 billion market cap, major security firms, and a national justice court network. The researchers did not disclose the names of the affected companies and ensured their experiment did not cause harm, only collecting identifying information and including a disclosure in the extension's documentation.

Following their experiment, the researchers examined the broader threat landscape of the VSCode Marketplace using a custom tool named 'ExtensionTotal' to identify high-risk extensions. Their findings included:

- 1,283 extensions with known malicious code (229 million installs).
- 8,161 extensions communicating with hardcoded IP addresses.
- 1,452 extensions running unknown executables.
- 2,304 extensions using another publisher's GitHub repository, indicating they are copycats.

The researchers highlighted a significant lack of stringent controls and code review mechanisms on the VSCode Marketplace, allowing rampant abuse of the platform. "VSCode extensions are an abused and exposed attack vertical, with zero visibility, high impact, and high risk," they warned.

All detected malicious extensions were reported to Microsoft for removal, but most remain available for download. The researchers plan to release 'ExtensionTotal' as a free tool to help developers scan their environments for potential threats.

BleepingComputer has reached out to Microsoft to inquire about potential security improvements to the VSCode Marketplace to combat typosquatting and impersonation, but no response has been received as of publication time.