MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
extension
Search

Cyber-Espionage Group Uses Chrome Extension To Infect Victims

Wednesday December 5, 2018. 11:00 PM , from Slashdot
In what appears to be a first on the cyber-espionage scene, a nation-state-backed hacking group has used a Google Chrome extension to infect victims and steal passwords and cookies from their browsers. From a report: This is the first time an APT (Advanced Persistent Threat -- an industry term for nation-state hacking groups) has been seen (ab)using a Chrome extension, albeit it's not the first time one has used a browser extension, as the Russian-linked Turla APT previously used a Firefox add-on in 2015. According to a report that's going to be published later today by the ASERT team at Netscout reveals the details of a spear-phishing campaign that's been pushing a malicious Chrome extension since at least May 2018.

Hackers used spear-phishing emails to lure victims on websites copied from legitimate academic organizations. These phishing sites, now down, showed a benign PDF document but prevented users from viewing it, redirecting victims to the official Chrome Web Store page to install a (now removed) Chrome extension named Auto Font Manager.

Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/vRv2DCv08d0/cyber-espionage-group-uses-chrome-extension-to-...
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
Nov, Thu 21 - 16:02 CET