Phishy Business: Chrome Extensions Hijacked in Sneaky OAuth Scam

A deceptive phishing campaign targeted Chrome extension developers, leading to the compromise of at least 35 extensions, including those from Cyberhaven. Attackers used malicious OAuth applications to inject data-stealing code, particularly targeting Facebook accounts. This cyber plot unfolded like a bad crime movie, but with fewer car chases and more stolen Facebook IDs.

Pro Dashboard

Hot Take:

Looks like Chrome extension developers might need to hit the gym because they just got phished and hooked by some slick cybercriminals. This is why you should always read the fine print and avoid clicking on that tempting ‘Go To Policy’ button like it’s a surprise party invite from your least favorite coworker. Consider this a PSA: when in doubt, just say no to OAuth!

Key Points:

  • At least 35 Chrome extensions were compromised through a phishing campaign targeting developers.
  • The attack involved a deceptive OAuth attack chain masquerading as a Google policy violation email.
  • Malicious code was injected into extensions, targeting Facebook business accounts specifically.
  • The phishing campaign was traced back to March 2024, although major activity was noted in December 2024.
  • Multi-factor authentication did not prevent the attack due to inherent OAuth authorization weaknesses.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?