Experts discovered Chrome largest spyware installation campaign

Chrome spyware installation campaign

Specialists from the company Awake Security reportado about currently perhaps the largest spyware campaign for installing spyware in Google Chrome. As part of the campaign, criminals registered thousands of domains and used extensions in Chrome to install malware on victims’ dispositivos.

Users installed spyware through 32,962,951 descargas of various malicious extensions.

“The Awake Security Threat Research Team has uncovered a massive global surveillance campaign exploiting the nature of Internet domain registration and browser capabilities to spy on and steal data from users across multiple geographies and industry segments. If anything, the severity of this threat is magnified by the fact that it is blatant and non-targeted — i.e. an equal opportunity spying effort”, — write Awake Security researchers.

Majority of free extensions are designed to warn users about suspicious web sites or convention of files from one format to another, sin embargo, en algunos casos, cybercriminals build in them additional functions to monitor user actions in the browser.

Según los expertos, the detected spyware installation campaign turned out to be the largest for Google Chrome in terms of the number of downloads.

Malware developers provided false contact information when they confirmed extensions to Google.

“After analyzing more than 100 networks across financial services, oil and gas, media and entertainment, healthcare and pharmaceuticals, minorista, high-tech, higher education and government organizations, Awake discovered that the actors behind these activities have established a persistent foothold in almost every network”, — explained Awake Security specialists.

Experts have discovered more than 15 mil malicious domains associated with each other, purchased from a small Galcomm registrar (also known as CommuniGal Communication Ltd) from Israel. According to Galcomm director Moshe Fogel, the company did not know anything about these malicious domains.

Researchers notified Google of their findings, and the company removed more than 70 malicious programs from the official Chrome Web Store.

Chrome spyware installation campaign
The intersection of malicious Chrome extensions and traditional malware

También, according to the findings of Awake Securitythe problem leads to serious questions about the fragility of the Internet.

Enterprise security teams would do well to recognize that rogue browser extensions pose a significant risk especially as more of our digital life is now conducted within the browser. Además, this threat is one that bypasses a number of traditional security mechanisms including endpoint security solutions, domain reputation engines, web proxies and cloud-based sandboxes.

Como podemos ver, “shit happens” even in such a proud security environment as Google Chrome. Sin embargo, recently we talked about a literal illustration of this sayingShitcoin Wallet for Google Chrome steals cryptocurrency passwords and keys.

Por Vladimir Krasnogolovy

Vladimir es un especialista técnico al que le encanta dar consejos y sugerencias cualificados sobre los productos de GridinSoft. Está disponible las 24 horas del día, los 7 días de la semana para ayudarte con cualquier pregunta relacionada con la seguridad en Internet.

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *