6. Exploit Chrome's Native Messaging API

0 26
A new type of attack method called “browser sync hijacking” (Browser Syncjacking...

Chrome

A new type of attack method called “browser sync hijacking” (Browser Syncjacking) demonstrates how to take control of the victim's device by using seemingly harmless Chrome extensions.

This attack method was discovered by the security researchers of SquareX, involving multiple steps including hijacking Google accounts, browsers, and ultimately achieving complete control of the device. Although the attack process is divided into multiple stages, its stealthiness is extremely high, requiring minimal permissions, and almost no action from the victim is required, just installing a seemingly legitimate Chrome extension.

Steps of sync hijacking attack

1. 创建malicious Google Workspace域

The attack begins with the creation of a malicious Google Workspace domain. The attacker sets up multiple user profiles in this domain and disables security features such as two-factor authentication. This Workspace domain will be used in the background to create a hosted configuration file on the victim's device.

2. 发布伪装成legitimate tool的extension

Subsequently, the attacker publishes an extension in the Chrome Web Store that appears to be a useful tool. This extension appears to be legitimate, but in fact, it hides malicious code.

3. 诱骗user安装extension

Through social engineering tactics, the attacker deceives the victim into installing the extension. After installation, the extension will silently log the victim into the Google Workspace hosted configuration file controlled by the attacker in the background.

4. Inject malicious content and诱骗sync

The extension will then open a legitimate Google support page. Due to the extension's read and write permissions on web pages, it will inject content into the page to prompt the user to enable the Chrome sync feature.

The victim chooses to synchronize their browser configuration filesThe victim chooses to synchronize their browser configuration filesSource: SquareX

Once synchronization is complete, all stored data, including passwords and browsing history, will be obtained by the attacker. The attacker can use the hijacked profile on their own device.

Add the victim to the hosted Google WorkspaceAdd the victim to the hosted Google WorkspaceSource: SquareX

5. Take over the browser

After taking control of the victim's profile, the attacker starts taking over the browser. In SquareX's demonstration, this was done through a fake Zoom update.

Prompt the victim to install a fake Zoom updateSource: SquareX

Researchers point out that the victim may receive a Zoom invitation, and when clicking on it to enter the Zoom web page, the extension will inject malicious content prompting the need to update the Zoom client. However, the downloaded file is actually an executable file containing a registration token, allowing the attacker to completely control the victim's browser.

“Once the registration is complete, the attacker will gain complete control over the victim's browser, allowing silent access to all web applications, installing additional malicious extensions, redirecting users to phishing websites, monitoring/modifying file downloads, and more,” SquareX researchers explain.

6. Exploit Chrome's Native Messaging API

By exploiting Chrome's Native Messaging API, attackers can establish a direct communication channel between malicious extensions and the victim's operating system. This allows them to browse directories, modify files, install malware, execute arbitrary commands, capture keyboard input, extract sensitive data, and even activate cameras and microphones.

Access the victim's Drive contentSource: SquareX

Stealthiness and harm of the attack

SquareX emphasizes the stealthiness and severe危害性 of this attack, pointing out that most users find it difficult to detect anomalies. “Unlike previous extension attack that required complex social engineering, this attack requires minimal permissions and simple social engineering steps, and can be executed almost without user interaction,” the report describes.

“Unless the victim is extremely paranoid about security and has sufficient technical ability to constantly check the Chrome settings for tags of the hosted browser, there are almost no obvious visual signs that the browser has been hijacked.”

Chrome extensions are usually considered isolated risks, but recent events (such as legitimate extensions used by millions of users being hijacked) indicate that this risk is far greater than imagined.

BleepingComputer has contacted Google about this new attack and will update the report if a response is received.

Reference source:

New Syncjacking attack hijacks devices using Chrome extensions

你可能想看:

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

ExploitPack (cracked) is an offensive penetration tool that includes 0day and a large number of undetectable exploit programs.

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

API Attack Analysis: Hackers exploit a large number of IPs for low-frequency crawling of sensitive data.

Expanding the Android attack surface: Analysis of React Native Android applications

Detailed explanation of house of emma exploitation techniques (analysis of 21 Huxiang Cup instances)

Analysis of SSRF Vulnerability in Next.js: A deep exploration of blind SSRF attacks and their preventive strategies

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

最后修改时间:
admin
上一篇 2025年03月26日 07:52
下一篇 2025年03月26日 08:15

评论已关闭