1 min read

Scammers Target Google Chrome Extension Developers

Liviu ARSENE

October 01, 2018

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Scammers Target Google Chrome Extension Developers

A recent phishing campaign targeting Chrome extension developers aims to trick them into giving away usernames and passwords that hackers can use to tamper with legitimate extensions.

In an attempt to collect developers” Google account passwords, hackers have been emailing Chrome extension developers using an alleged Google employee email address. Posing as Kevin Murphy (dev-support@webstoredevsupport[.]com), part of the Chrome Web Store Team, scammers tried to get developers to fill in a Google Form with a valid postal address, as a means for validating their accounts.

However, when clicking the URL, victims got directed to a webpage that prompted for credentials for Google account, and then redirected to a cloned Google account login webpage which allowed attackers to harvest usernames and passwords.

For the trained eye, the “https://login.chromewebstoresupport[.]com” URL hosting the Google account login page would have been enough to spot a fake, but it”s difficult to estimate just how many developers actually fell for it.

As a rule, Google has never used Google Forms to handle account information. Any emails pertaining to be from Google and requiring some sort of form completion should be treated as a phishing attempt and even reported.

While some developers came forward and admitted to have fallen victim during previous campaigns, it”s probably going to be a while before individual developer blog posts will show up accounting the story.

It”s likely the stolen credentials will be used by hackers to tamper with legitimate Chrome extensions and weaponize them with malicious code either to exfiltrate data from users or to download additional malware.

While this is not the most sophisticated phishing campaign, they often prey on a sense of urgency in order to trick victims into clicking on hyperlinks and inputting sensitive data.

Developers that believe to have been affected by the campaign are encouraged to start auditing their applications and remove any suspicious or unknown code, if found.

tags


Author



Right now

Top posts

The Holiday Guide to Tech Support: Fixing the Family Computer

The Holiday Guide to Tech Support: Fixing the Family Computer

November 24, 2021

2 min read
Bitdefender Celebrates 20 Years of Cybersecurity Leadership

Bitdefender Celebrates 20 Years of Cybersecurity Leadership

November 04, 2021

3 min read
Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

October 26, 2021

3 min read
What are drive-by download attacks and how do you prevent them?

What are drive-by download attacks and how do you prevent them?

October 25, 2021

2 min read
Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

October 22, 2021

2 min read
Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

October 20, 2021

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Chrome 96 Gets 22 More Security Fixes with New Incremental Update Chrome 96 Gets 22 More Security Fixes with New Incremental Update
Filip TRUȚĂ

December 08, 2021

1 min read
Most Employees Believe Passwords Affect Their Productivity, Research Finds Most Employees Believe Passwords Affect Their Productivity, Research Finds
Silviu STAHIE

December 06, 2021

1 min read
US State Department iPhones Infected with Pegasus Spyware – Report US State Department iPhones Infected with Pegasus Spyware – Report
Filip TRUȚĂ

December 06, 2021

2 min read