"Malicious Chrome Extensions Used in Global Surveillance Campaign"

The cybersecurity firm, Awake Security, released a report on the discovery of 111 malicious or fake Chrome extensions created to collect sensitive user data from users across the world in different industry segments. The primary link between these malicious extensions is that they use GalComm domains for attacker command and control or loader pages. The extensions contain code that allows them to take screenshots, harvest credential tokens, grab user keystrokes, read the clipboard, and more. According to researchers, the extensions were found on the networks of organizations in financial services, oil, media, healthcare, retail, government, and other sectors. This article continues to discuss recent findings surrounding the malicious chrome extensions used in a massive global surveillance campaign. 

Security Week reports "Malicious Chrome Extensions Used in Global Surveillance Campaign"

Submitted by Anonymous on