FacebookInstagramTwitterContact

 

Brunei Youth League U15           >>           Pantai Mentiri Amateur Open Golf Club Championship           >>           Reverse Heart Disease Through DIETARY CHOICES: Here’s Where To Start           >>           How Curcumin Could Revolutionize BOWEL CANCER PREVENTION           >>           Brunei Youth League U18           >>           Temporary Half Lane Closure           >>           Kate Hudson Shares Glimpse Into Family Vacation With Kids Bingham And Rani           >>           Missing           >>           Perbadanan TAIB receive Two Prestigious Awards           >>           Bay FC's Racheal Kundananji Says Zambia Are Going To Shake Up Women's AFCON Hierarchy           >>          

 

SHARE THIS ARTICLE




REACH US


GENERAL INQUIRY

[email protected]

 

ADVERTISING

[email protected]

 

PRESS RELEASE

[email protected]

 

HOTLINE

+673 222-0178 [Office Hour]

+673 223-6740 [Fax]

 



Upcoming Events





Prayer Times


The prayer times for Brunei-Muara and Temburong districts. For Tutong add 1 minute and for Belait add 3 minutes.


Imsak

: 04:34 AM

Subuh

: 04:44 AM

Syuruk

: 06:09 AM

Doha

: 06:33 AM

Zohor

: 12:22 PM

Asar

: 03:48 PM

Maghrib

: 06:34 PM

Isyak

: 07:49 PM

 



The Business Directory


 

 



Security & Privacy


  Home > Security & Privacy


Hackers Injected Malicious Code Into Several Chrome Extensions In Recent Attack


NurPhoto via Getty Images

 


 December 31st, 2024  |  00:12 AM  |   672 views

ENGADGET

 

Cyberhaven, a cybersecurity company whose extension was hit, shared some details about the incident this weekend.

 

Hackers were reportedly able to modify several Chrome extensions with malicious code this month after gaining access to admin accounts through a phishing campaign. The cybersecurity company Cyberhaven shared in a blog post this weekend that its Chrome extension was compromised on December 24 in an attack that appeared to be “targeting logins to specific social media advertising and AI platforms.” A few other extensions were hit as well, going back to mid-December, Reuters reported. According to Nudge Security’s Jaime Blasco, that includes ParrotTalks, Uvoice and VPNCity.

 

Cyberhaven notified its customers on December 26 in an email seen by TechCrunch, which advised them to revoke and rotate their passwords and other credentials. The company’s initial investigation of the incident found that the malicious extension targeted Facebook Ads users, with a goal of stealing data such as access tokens, user IDs and other account information, along with cookies. The code also added a mouse click listener. “After successfully sending all the data to the [Command & Control] server, the Facebook user ID is saved to browser storage,” Cyberhaven said in its analysis. “That user ID is then used in mouse click events to help attackers with 2FA on their side if that was needed.”

 

Cyberhaven said it first detected the breach on December 25 and was able to remove the malicious version of the extension within an hour. It’s since pushed out a clean version.

 


 

Source:
courtesy of ENGADGET

by Cheyenne MacDonald

 

If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]

 

Related News


Lahad Datu Murder: Remand Of 13 Students Extende

 2024-03-30 07:57:54

Russia Becomes First State To Recognise Afghanistan's Taliban Government

 2025-07-05 01:57:40

Trump Says US To Start Sending Out Tariff Letters

 2025-07-05 02:23:28