TechCrunch News 2024年12月28日
Cyber firm’s Chrome extension hijacked to steal user passwords
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

数据防泄漏公司Cyberhaven的Chrome浏览器插件遭遇恶意更新,可能导致用户密码和会话令牌被窃取。攻击者利用公司账户在12月25日发布了恶意更新,受影响用户敏感信息可能泄露。Cyberhaven已确认事件,并从Chrome商店移除了恶意版本,发布了新版本。受影响用户被建议撤销并更换所有密码及API令牌,并检查日志。此次事件可能是一场针对Chrome插件开发者的广泛攻击活动的一部分,涉及多个插件,但目前尚不清楚幕后黑手是谁。

🚨Cyberhaven的Chrome插件遭遇供应链攻击,黑客通过入侵公司账户发布恶意更新,可能导致用户敏感信息泄露。

🍪受影响的用户需要立即撤销并更换所有密码以及API令牌等凭证,并检查相关日志是否存在异常活动,因为攻击者可能利用窃取的会话令牌和cookies绕过安全措施。

🛡️Cyberhaven已迅速采取行动,移除了Chrome商店中的恶意插件版本(24.10.4),并发布了新的安全版本(24.10.5),同时聘请了事件响应公司Mandiant进行调查,并积极配合联邦执法部门。

🌐此次攻击可能并非针对Cyberhaven,而是针对Chrome插件开发者的一次广泛攻击活动,多个插件受到影响,表明攻击者可能利用开发者凭证进行攻击。

Data-loss prevention startup Cyberhaven says hackers published a malicious update to its Chrome extension that was capable of stealing customer passwords and session tokens, according to an email sent to affected customers, who may have been victims of this suspected supply-chain attack.

Cyberhaven confirmed the cyberattack to TechCrunch on Friday but declined to comment on specifics about the incident. 

An email from the company sent to customers, obtained and published by security researcher Matt Johansen, said the hackers compromised a company account to publish a malicious update to its Chrome extension in the early morning of December 25. The email said that for customers running the compromised browser extension, “it is possible for sensitive information, including authenticated sessions and cookies, to be exfiltrated to the attacker’s domain.” 

Cyberhaven spokesperson Cameron Coles declined to comment on the email but did not dispute its authenticity. 

In a brief emailed statement, Cyberhaven said its security team detected the compromise in the afternoon of December 25, and that the malicious extension (version 24.10.4) was then removed from the Chrome Web Store. A new legitimate version of the extension (24.10.5) was released soon after. 

Cyberhaven offers products that it says protect against data exfiltration and other cyberattacks, including browser extensions, which allow the company to monitor for potentially malicious activity on websites. The Chrome web store shows the Cyberhaven extension has around 400,000 corporate customer users as of time of writing.

When asked by TechCrunch, Cyberhaven declined to say how many affected customers it had notified about the breach. The California-based company lists technology giants Motorola, Reddit, and Snowflake as customers, as well as law firms and health insurance giants.

According to the email that Cyberhaven sent to its customers, affected users should “revoke” and “rotate all passwords” and other text-based credentials, such as API tokens. Cyberhaven said customers should also review their own logs for malicious activity. (Session tokens and cookies for logged-in accounts that are stolen from the user’s browser can be used to log-in to that account without needing their password or two-factor code, effectively allowing hackers to bypass those security measures.)

The email does not specify whether customers should also change any credentials for other accounts stored in the Chrome browser, and Cyberhaven’s spokesperson declined to specify when asked by TechCrunch. 

According to the email, the compromised company account was the “single admin account for the Google Chrome Store.” Cyberhaven did not say how the company account was compromised, or what corporate security policies were in place that allowed the account compromise. The company said in its brief statement that it has “initiated a comprehensive review of our security practices and will be implementing additional safeguards based on our findings.” 

Cyberhaven said it’s hired an incident response firm, which the email to customers says is Mandiant, and is “actively cooperating with federal law enforcement.”

Jaime Blasco, the co-founder and CTO of Nudge Security, said in posts on X that several other Chrome extensions were compromised as apparently part of the same campaign, including several extensions with tens of thousands of users.

Blasco told TechCrunch that he is still investigating the attacks, and believes at this point that there were more extensions compromised earlier this year, including some related to AI, productivity, and VPNs..

“It seems it wasn’t targeted against Cyberhaven, but rather opportunistically targeting extension developers,” said Blasco. “I think they went after the extensions that they could based on the developers’ credentials that they had.”

In its statement to TechCrunch, Cyberhaven said that “public reports suggest this attack was part of a wider campaign to target Chrome extension developers across a wide range of companies.” At this point it’s unclear who is responsible for this campaign, and other affected companies and their extensions have yet to be confirmed.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Cyberhaven Chrome插件 供应链攻击 数据泄露 网络安全
相关文章