Security

Crypto users left vulnerable via sham Google Chrome extension

Crypto users discovered a harmful Google Chrome extension designed to steal funds by manipulating website cookie data.

Binance trader “doomxbt” first spotted the issue in February after noticing $70,000 in losses linked to suspicious activity. The attacker initially deposited the stolen funds on the AI-powered crypto exchange SideShift.

i have been compromised in some strange way and my @binance account was drained out, out of nowhere i heard sound notifications about orders getting filled while i never placed any – suddenly my 70k amount was suddenly 0 on screen pic.twitter.com/NEkSQVbBQc

— 𝔡𝔬𝔬𝔪 (@doomxbt) February 29, 2024

On Tuesday, the culprit was reportedly linked to a fake Aggr app extension on Google’s Chrome store. Unlike the legitimate Aggr app which provides professional trading tools like on-chain liquidation trackers, the malicious version included code to collect all website cookies from users, allowing hackers to reconstruct passwords and user keys, especially for Binance accounts.

⚠️DO NOT DOWNLOAD THE AGGR CHROME EXTENSION⚠️

We finally found how @doomxbt lost his funds on Binance.
There is a malicious Aggr app on the Chrome store with good reviews that steals all cookies on all websites you visit, and 2 months ago someone paid a handful of influencers… pic.twitter.com/XEPbwKX0XW

— Tree (🌲,🌲) (@Tree_of_Alpha) May 28, 2024

You might also like: Binance user shares update on $70k loss incident highlighting security gaps and response concerns

Inept due diligence from crypto influencers or an elaborate scam?

Once the fake Aggr app was available on the Chrome Store, hackers launched a social media campaign to encourage downloads.

The developers hired a network of influencers to promote the malicious software in a process known as “shilling”. Social media accounts populated timelines with trading buzzwords to convince users the tool was needed.

In this case, these influencers either forgot the popular crypto chant “do your own research” AKA “DYOR”, or ignored it. It’s unknown if promoters knew the fake Aggr left users vulnerable or if social media accounts profited from the attack.

Following the incident, crypto.news reached out to some promoters for comment, but at least one blocked the request.

This incident is part of a larger trend, as similar attacks using Chrome extensions have occured recently. Last month, a trader lost over $800,000 in digital assets after interacting with two malicious Chrome browser extensions. Users are advised to DYOR and double-check any application before downloading to devices.

At first glance the extension is mostly harmless, importing a small “background.js” file and the popular javascript extension “jquery”. pic.twitter.com/lxFcSvxP4V

— Tree (🌲,🌲) (@Tree_of_Alpha) May 28, 2024

Read more: Multisig in defi: a marketing gimmick or a real security solution? | Opinion

Source

Click to rate this post!
[Total: 0 Average: 0]
Show More

Leave a Reply

Your email address will not be published. Required fields are marked *