- Local time
- 10:22 PM
- Posts
- 719
- OS
- WinDOS 23H2
Oh No, FF changed the wording in their ToU (Terms of Use) - and even tho - there's no proof of any actual malicious actions - let's jump boats to Chrome - where it's Cozy 'N Safe, or is it...
Cybersecurity researchers have found malicious shapeshifting Google Chrome browser extensions in the wild, able to change their appearance to pretty much anything else installed on the target device, opening the doors for credential theft, cryptocurrency theft, and possibly even wire fraud.
Researchers from SquareX said they spotted a malicious browser extension which at first, seems benign. It can be an “unassuming AI tool”, or pretty much anything else. When it’s first installed, it will behave as expected, for at least a while, while it analyzes which other extensions are installed in the browser.
If it spots anything particularly interesting (such as a crypto wallet, for example), the extension will completely transform its appearance, including the interface, the shortcut icon, and everything else, to look exactly the same. It will then disable the legitimate extension, so that it is the only one offering that particular functionality - meaning it is almost impossible for the victim to realize they are being targeted.
www.techradar.com
...
- Researchers find malicious browser extensions can assume the appearance of any other installed in the browser
- It can also disable other extensions, completely tricking the victim
- The extension can steal sensitive passwords, cryptos, and more
Cybersecurity researchers have found malicious shapeshifting Google Chrome browser extensions in the wild, able to change their appearance to pretty much anything else installed on the target device, opening the doors for credential theft, cryptocurrency theft, and possibly even wire fraud.
Researchers from SquareX said they spotted a malicious browser extension which at first, seems benign. It can be an “unassuming AI tool”, or pretty much anything else. When it’s first installed, it will behave as expected, for at least a while, while it analyzes which other extensions are installed in the browser.
If it spots anything particularly interesting (such as a crypto wallet, for example), the extension will completely transform its appearance, including the interface, the shortcut icon, and everything else, to look exactly the same. It will then disable the legitimate extension, so that it is the only one offering that particular functionality - meaning it is almost impossible for the victim to realize they are being targeted.

Malicious "polymorphic" Chrome extensions can mimic other tools to trick victims
Would you be able to tell a shapeshifter from a real Chrome extension?
...

My Computer
System One
-
- OS
- WinDOS 23H2
- Computer type
- Laptop
- CPU
- Intel & AMD
- Memory
- SO-DIMM SK Hynix 15.8 GB Dual-Channel DDR4-2666 (2 x 8 GB) 1329MHz (19-19-19-43)
- Graphics Card(s)
- nVidia RTX 2060 6GB Mobile GPU (TU106M)
- Sound Card
- Onbord Realtek ALC1220
- Screen Resolution
- 1920 x 1080
- Hard Drives
- 1x Samsung PM981 NVMe PCIe M.2 512GB / 1x Seagate Expansion ST1000LM035 1TB