Attackers Use Malicious Browser Extension To Steal From Chrome Users

Share post:

Volexity security experts have uncovered a malware campaign by a North Korean threat group identified as Kimsuky.

The campaign uses a malicious browser extension called SHARPEXT to steal emails from Google or Microsoft Edge users who read their webmail. The campaign supports three Chrome-based web browsers: Chrome, Edge and Whale.

The malicious extension is installed after a victim’s system is compromised with a custom VBS script. Here, attackers replace the ‘Preferences’ and ‘Secure Preferences’ with those downloaded from the malware’s command-and-control server.

After the new preferences files are installed, the web browser automatically loads the SHARPEXT extension.

SHARPEXT can be used to collect a wide range of information using commands listing previously collected emails from the victim, listing email domains with which the victim had previously communicated, blacklisting email senders, and adding a domain to the list of all domains viewed by the victim.

Others include uploading a new attachment to the remote server, uploading Gmail data to the remote server, and uploading AOL data to the remote server.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Anthropic Warns: AI “Virtual Employees” Could Pose Security Risks Within a Year

Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as...

Hertz Data Breach Exposes Customer Information via Supply Chain Hack

Hertz has disclosed a data breach resulting from a cyberattack on its vendor, Cleo Communications, which compromised sensitive...

Google’s New Security Feature – Automatic Reboot

Google is introducing a new security feature in its latest Android update that will automatically reboot phones and...

Cybersecurity Firm Prodaft Buys Hacker Forum Accounts to Monitor Cybercriminal Activity

Swiss cybersecurity company Prodaft has initiated a program to purchase verified and aged accounts on hacking forums, aiming...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways