Cyber security news for all

More

    Google removed 49 other malicious extensions that steal crypto data

    Google has blocked 49 extensions for the Chrome browser, which masquerade as crypto money services but should actually steal from users. Specifically, the malicious extensions disguised themselves as add-ons.

    There have been reports of thefts, probably due to this or similar extensions. Some of the extensions also saw a small network of fake users, which provided reviews and short review texts. The placement of the fake extensions were noticed last month and then increased in number. This could mark the beginning of a wave, but it could also be due to more precise detection and observation, which simply finds more cases.

    The current measure also punishes developers who are not indebted. Suspension can also become a problem for users if security gaps cannot be patched. The ban on publishing or updating affects all paid extensions. These include Chrome extensions, which require a fee to be paid prior to installation, extensions that work on the basis of monthly subscriptions, or Chrome extensions which have access to various functions through one time app purchases.

    Extensions Managed To Trick Users Into Installing Various Applications

    MyCrypto’s security director explained the issue in detail in his recent contribution. He explained that the extensions managed to trick users into installing them by mimicking various applications. An example of this is Ledger, a case that has made headlines several times recently. Other examples are KeepKey, Trezor, MyEtherWallet and others.

    After the user installed them, the extensions would steal their wallet’s private keys and similarly sensitive data. MyCrypto also added that some of these extensions could be quite progressive, with entire networks of fake users who rated the app. Of course, users would give the apps the best possible feedback to get others to use them. Of course, the extensions contain malicious files and they can store any data that users would enter. Then they would either be forwarded to a Google form or to a remote server operated by hackers.

    Recent Articles

    Russian Cybercriminal Behind “Cardplanet” Site Sentenced

    According to the United States Department of Justice, a Russian cybercriminal, Aleksey Burkov, 30—who operated Cardplanet site: a site that trafficked stolen card details—has...

    Hackers Used Malicious Docker Images to Mine Monero

    Researchers found malicious images on Docker Hub used for crypto mining. Palo Alto Networks' Unit  42, unraveled a crypto mining scheme which uses malicious Docker...

    NSA outlines requirements for secure collaboration services for US government telework

    The new National Security Agency (NSA) guidelines are a window of security for users. Everyone has been trying to return to their lives since...

    Cybercriminals threaten to sell off “scandalous” files swiped from Mariah Carey, Nicki Minaj, Puff Daddy’s legal eagles

    There's no escaping these cybercriminals. In a recent case of "cyber-extortion," threat actors known as REvil, are threatening to expose celebrity "dirt." These threat actors...

    Twitter apologises for exposed customers data

    In what is described as a "data security incident," sensitive details of Twitter's customers were exposed. Unlike other cases of a breach which are...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox