Connect with us

Security

Beware: Malicious Chrome Extensions Stealing User Credentials

Published

on

Malicious Chrome Extensions in Web Store Steal User Credentials

Recently, researchers have discovered two Chrome extensions in the Web Store known as ‘Phantom Shuttle’ that are disguising themselves as plugins for a proxy service. These extensions have been designed to intercept user traffic and extract sensitive data.

Despite the malicious intent of these extensions, they are still available for download on Chrome’s official marketplace and have been operational since at least 2017. The Socket supply-chain security platform released a report detailing the deceptive practices of these extensions.

The primary target audience of Phantom Shuttle includes users in China, particularly foreign trade workers who require connectivity testing from various locations within the country.

Both extensions are attributed to the same developer and are marketed as tools for proxying traffic and conducting network speed tests. They are available for subscription at prices ranging from $1.4 to $13.6.

The Phantom Shuttle extension on the Web Store
The Phantom Shuttle extension on the Web Store
Source: BleepingComputer

Covert Malicious Functionality

Researchers at Socket.dev have uncovered that Phantom Shuttle reroutes all user web traffic through proxies controlled by the threat actor, which are accessible using hardcoded credentials. This malicious code is inserted into the legitimate jQuery library.

The extensions employ a custom character-index encoding scheme to conceal the hardcoded proxy credentials. By utilizing a web traffic listener, the extensions can intercept HTTP authentication challenges on any website.

To redirect user traffic through the attacker’s proxies, the extensions dynamically adjust Chrome’s proxy settings via an auto-configuration script.

Under the default “smarty” mode, over 170 high-value domains are directed through the proxy network, including developer platforms, cloud services, social media platforms, and adult content sites. Notably, local networks and the command-and-control domain are excluded to avoid detection.

See also  BlackCat Ransomware: Cybersecurity Insiders Indicted by U.S. Prosecutors

While operating as a man-in-the-middle, the extensions can capture data from various forms (credentials, card details, passwords, personal information), extract session cookies from HTTP headers, and obtain API tokens from requests.

BleepingComputer has reached out to Google regarding the presence of these extensions in the Web Store, but no immediate response has been provided.

Chrome users are advised to exercise caution when installing extensions, favoring those from reputable developers, reviewing user feedback, and scrutinizing permissions requested during installation.

tines

Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

This comprehensive guide delves into the reasons traditional IAM practices fall short in meeting modern demands, provides examples of effective IAM strategies, and offers a simple checklist for crafting a scalable approach.

Trending