Article Details
Scrape Timestamp (UTC): 2025-03-06 14:26:25.212
Original Article Text
Click to Toggle View
Malicious Chrome extensions can spoof password managers in new attack. A newly devised "polymorphic" attack allows malicious Chrome extensions to morph into browser extensions, including password managers, crypto wallets, and banking apps, to steal sensitive information. The attack was devised by SquareX Labs, which warns of its practicality and feasibility on the latest version of Chrome. The researchers have responsibly disclosed the attack to Google. Shape-shifting Chrome extensions The attack begins with the submission of the malicious polymorphic extension on Chrome's Web Store. SquareX uses an AI marketing tool as an example, which offers the promised functionality, tricking victims into installing and pinning the extension on their browser. To get a list of other installed extension, the malicious extension abuses the the 'chrome.management' API, which it was given access to during installation. If the malicious extension doesn't have this permission, SquareX says there's a second, stealthier way to achieve the same, involving resource injection onto web pages the victim visits. The malicious script attempts to load a specific file or URL unique to targetted extensions, and if it loads, it can be concluded that the extension is installed. The list of installed extensions is sent back to an attacker-controlled server, and if a targeted one is found, the attackers command the malicious extension to morph into the targeted one. In SquareX's demonstration, the attackers impersonate the 1Password password manager extension by first disabling the legitimate one using the 'chrome.management' API, or if the permissions aren't available, user interface manipulation tactics to hide it from the user. Simultaneously, the malicious extension switches its icon to mimic that of 1Password, changes its name accordingly, and displays a fake login popup that matches the appearance of the real one. To force the user into entering their credentials, when attempting to log in to a site, a fake "Session Expired" prompt is served, making the victim think they were logged out. This will prompt the user to log back into 1Password through a phishing form that sends inputted credentials back to the attackers. Once the sensitive information is sent to the attackers, the malicious extension reverts to its original appearance, and the real extension is re-enabled, so everything appears normal again. A demonstration of this attack can be seen below, where the malicious extension impersonates 1Password. Mitigation measures SquareX recommends that Google implement specific defenses against this attack, such as blocking abrupt extension icons and HTML changes on installed extensions or at least notifying users when this happens. However, at the time of writing, there are no measures to prevent this kind of deceptive impersonation. SquareX researchers also noted that Google wrongfully classifies the 'chrome.management' API as "medium risk," and it is extensively accessed by popular extensions such as page stylers, ad blockers, and password managers. BleepingComputer has contacted Google to request a comment on the topic, and we will update this post as soon as we hear back.
Daily Brief Summary
Malicious Chrome extensions are capable of spoofing legitimate browser extensions like password managers, crypto wallets, and banking apps to harvest sensitive information.
The attack, created by SquareX Labs, is described as "polymorphic," meaning the malicious extension can change its appearance and functionality to impersonate legitimate extensions.
The attack starts with the installation of an apparently genuine extension from Chrome's Web Store, which then uses AI to change its behavior based on the other extensions it detects on the user's browser.
Techniques used include exploiting the 'chrome.management' API to ascertain which extensions are installed and resource injection to check for the presence of specific target extensions.
If the malicious extension detects a target like 1Password, it deactivates the real extension and replaces its icon and name, presenting a fake login popup to capture user credentials through phishing.
After harvesting credentials, the deceptive extension reverts to its original form and reactivates the legitimate extension, leaving the user unaware of any interference.
SquareX has recommended that Google implement measures to block or alert users to sudden changes in installed extensions to prevent this type of exploitation.