Hackers have eroticized womandiscovered a new way to remotely take control of your computer — all through the Google Chrome web browser.
A report from cybersecurity company SquareX lays out the new multifaceted cyberattack, which the firm has dubbed "browser syncjacking."
At the core of the attack is a social engineering element, as the malicious actor first must convince the user to download a Chrome extension. The Chrome extension is usually disguised as a helpful tool that can be downloaded via the official Chrome Store. It requires minimal permissions, further cementing its perceived legitimacy to the user. According to SquareX, the extension actually does usually work as advertised, in order to further disguise the source of the attack from the user.
Meanwhile, secretly in the background, the Chrome extension connects itself to a managed Google Workspace profile that the attacker has set up in advance. With the user now unknowingly signed into a managed profile, the attacker sends the user to a legitimate Google support page which is injected with modified content through the Chrome extension, telling the user they need to sync their profile.
When the user agrees to the sync, they unwittingly send all their local browser data, such as saved passwords, browsing history, and autofill information, to the hacker's managed profile. The hacker can then sign into this managed profile on their own device and access all that sensitive information.
The attack up to this point already provides the hacker with enough material to commit fraud and other illicit activities. However, browser syncjacking provides the hacker with the capability to go even further.
Using the teleconferencing platform Zoom as an example, SquareX explains that using the malicious Chrome extension, the attacker can send the victim to an official yet modified Zoom webpage that urges the user to install an update. However, the Zoom download that's provided is actually an executable file that installs a Chrome browser enrollment token from the hacker's Google Workspace.
After this occurs, the hacker then has access to additional capabilities and can gain access to the user's Google Drive, clipboard, emails, and more.
The browser syncjacking attack doesn't stop there. The hacker can take one further step in order to not just take over the victim's Chrome profile and Chrome browser, but also their entire device.
Through that same illicit download, such as the previously used Zoom update installer example, the attacker can inject a "registry entry to message native apps" by weaponizing Chrome’s Native Messaging protocol. By doing this, the attacker basically sets up a connection "between the malicious extension and the local binary." Basically, it creates a flow of information between the hacker's Chrome extension and your computer. Using this, the hacker can send commands to your device.
What can the hacker do from here? Pretty much anything they want. The attacker will have full access to the user's computer files and settings. They can create backdoors into the system. They can steal data such as passwords, cryptocurrency wallets, cookies, and more. In addition, they can track the user by controlling their webcam, take screenshots, record audio, and monitor everything input into the device.
As you can see, browser syncjacking is nearly completely unrecognizable as an attack to most users. For now, the most important thing you can do to protect yourself from such a cyberattack is to be aware of what you download and only install trusted Chrome extensions.
Topics Cybersecurity Google
Halide's 'premium camera' app wants to help you shoot like a proDrunk dude gets the best selfie after being taken home by policeAmazon has quietly turned its mobile app into a weird and wonderful ecommerce arsenalAfter destroying humans, Google's AlphaGo hangs up its Go glovesLebanon bans the new 'Wonder Woman' movieMcLaren's supercar factory is a minimalist's paradiseThere's now a crowdfunding campaign to buy stolen hacking toolsThere's now a crowdfunding campaign to buy stolen hacking tools'Stranger Things' star Millie Bobby Brown once auditioned to be a Marvel superheroWatch this man transform into Wonder Woman before your very eyesArcades of the future are going to be amazing, if StarVR is any indication'Injustice 2' v.s. the worst Superman game of all timeDrunk dude gets the best selfie after being taken home by policeQueen Elizabeth II reportedly a big fan of her life story in 'The Crown'The problem with millennials isn’t millennials—it’s how you’re leading themActual politics has caught up to and surpassed 'House of Cards'Flight delay? Get reimbursed with this clever appNorth Korea loves Apple so much, it's produced an iPad of its own'Overwatch' teases space gorillas and the lunar colony they live onIs James Corden trying to usurp Ryan Seacrest as the busiest man in showbiz? Emma Larkin, Bangkok by Matteo Pericoli A Routine Matter: On Habits, William James, and Charles Duhigg Fever Pitch by Morgan Macgregor Instagram testing 'personal fundraising' right in the app The Fetish by Vanessa Blakeslee On the Scent by Emily Gould Nice guy Ryan Reynolds puts up a cash reward for a lost teddy bear Influencers stopped caring about the pandemic. Here’s why that's so dangerous. Hari Kunzru on ‘Gods Without Men’ by Amitava Kumar Susanne Kippenberger on ‘Kippenberger’ by Miranda Purves 'The Muppets Mayhem' reveals Animal's origin story Google Pixel Tablet announced: Specs, release date, price, preorder details Twitter's encrypted DMs are here, but they have many flaws 'I am the canary': Vivienne Westwood protests from giant birdcage for Julian Assange White House lies about 'Paw Patrol' being canceled and everything is so stupid The Hobbit Pub Sued, Build Your Own Murakami, and Other News '10 MacBooks' hacker returns to Twitter, steals actor LeVar Burton's account 'Quordle' today: See each 'Quordle' answer and hints for May 11 'I have a joke' is Twitter's newest meme you can't escape Wordle today: Here's the answer and hints for May 10
3.3051s , 10194.875 kb
Copyright © 2025 Powered by 【eroticized woman】,Pursuit Information Network