Connect with us

Security

Corporate Espionage: The Dark Side of Zoom Stealer Browser Extensions

Published

on

A recently uncovered scheme known as Zoom Stealer has impacted around 2.2 million users of Chrome, Firefox, and Microsoft Edge through 18 browser extensions. These extensions are designed to gather data related to online meetings, including URLs, IDs, topics, descriptions, and even embedded passwords.

The Zoom Stealer campaign is part of a larger pattern involving three browser extension campaigns that have targeted over 7.8 million users in the span of seven years. These campaigns have been linked to a single threat actor identified as DarkSpectre.

DarkSpectre, the threat actor behind Zoom Stealer, is believed to be the same entity responsible for previous campaigns like GhostPoster targeting Firefox users and ShadyPanda, which delivered spyware to Chrome and Edge users, based on the shared infrastructure.

Wiz

ShadyPanda, another campaign linked to DarkSpectre, continues to operate through 9 extensions and an additional 85 ‘sleepers’ that gradually turn malicious through updates. This information comes from researchers at Koi Security, a supply-chain security company.

Campaign discovery flow
Campaign discovery flow
Source: Koi Security

The connection to China has become more apparent with DarkSpectre, evident from hosting servers on Alibaba Cloud, ICP registrations, Chinese-language artifacts, and activity aligned with the Chinese timezone, as well as monetization strategies tailored to Chinese e-commerce.

Corporate meeting intelligence

While the 18 extensions in the Zoom Stealer campaign are not exclusively focused on meeting data, some can be used for downloading videos or as recording tools. Notable extensions include Chrome Audio Capture with 800,000 installations and Twitter X Video Downloader, still accessible on the Chrome Web Store.

Researchers at Koi Security emphasize that these extensions are fully functional and perform their advertised tasks.

See also  Lightning Round: Lazarus Makes Waves in Web3, Intel/AMD TEEs Breached, Dark Web Leak Tool Unveiled & Beyond
The Chrome Audio Capture extension
The Chrome Audio Capture extension
Source: Koi Security

According to Koi Security, all extensions in the Zoom Stealer campaign request permissions to access 28 video-conferencing platforms and collect various data points related to meetings. This includes meeting URLs, IDs, registration status, topics, speaker details, company information, and more.

The collected data is transmitted in real-time to threat actors via WebSocket connections, triggered when users interact with webinar registration pages or join meetings on conferencing platforms.

This data could be utilized for corporate espionage, sales intelligence, or social engineering attacks. It could potentially enable impersonation operations by providing attackers with valuable insights into confidential calls and participant lists.

Koi Security’s report highlights the importance of scrutinizing extension permissions and minimizing their usage to essential requirements to mitigate risks.

The researchers flagged the malicious extensions, but several remain available on the Chrome Web Store. A comprehensive list of active DarkSpectre extensions has been published.

BleepingComputer has reached out to InfinityNewTab and Google for comments, and updates will be provided accordingly.

tines

Issues with Identity and Access Management (IAM) extend beyond IT, impacting various aspects of a business. This guide explores the shortcomings of traditional IAM practices, showcases effective IAM strategies, and offers a checklist for creating a scalable IAM approach.

Trending