{"id":120552,"date":"2021-02-07T14:10:11","date_gmt":"2021-02-07T14:10:11","guid":{"rendered":"https:\/\/www.techweekmag.com\/?p=120552"},"modified":"2024-02-24T15:32:38","modified_gmt":"2024-02-24T15:32:38","slug":"hackers-can-use-chrome-sync-to-steal-passwords-through-extensions","status":"publish","type":"post","link":"https:\/\/www.stereoindex.com\/tech\/technology\/hackers-can-use-chrome-sync-to-steal-passwords-through-extensions\/","title":{"rendered":"Hackers can use Chrome sync to steal passwords through extensions"},"content":{"rendered":"<p>Croatian information security specialist Bojan Zdrnja discovered that Google Chrome&#8217;s built-in sync function could be used by malicious extensions to steal passwords and other personal data from users&#8217; devices.<\/p>\n<div class=\"div_empty_padding1\"><\/div>\n<p>According to a resource, an unnamed malicious extension uses the Chrome Sync function to communicate with a remote server of the attackers.\u00a0During this process, they can obtain passwords and other data.\u00a0This function is needed to synchronize data between users&#8217; devices: passwords, bookmarks, browsing history, browser settings and extensions.\u00a0All this is stored in the cloud on Google servers.<\/p>\n<p>The malware was hiding under the Forcepoint security extension, allowing an attacker to control the infected browser.\u00a0The code contained in it created a special text field to store the token keys that were synchronized with the Google cloud.\u00a0There could be different data, including passwords.<\/p>\n<blockquote><p>\u201cTo download, read or delete these keys, the attacker only had to log in with the same Google account, but in a different Chrome browser (it could be a one-time account).\u00a0After that, he could interact with the Chrome browser on the victim&#8217;s network, abusing Google&#8217;s infrastructure, \u201dwrote Bojan Zdrnja on the Internet Storm Center forum.<\/p><\/blockquote>\n<p>The expert advises using corporate Chrome features and group policies to control the work of installed extensions and, if necessary, block them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Croatian information security specialist Bojan Zdrnja discovered that Google Chrome&#8217;s built-in sync function could be used by malicious extensions to steal passwords and other personal data from users&#8217; devices. According to a resource, an unnamed malicious extension uses the Chrome Sync function to communicate with a remote server of the attackers.\u00a0During this process, they can [&hellip;] <a class=\"g1-link g1-link-more\" href=\"https:\/\/www.stereoindex.com\/tech\/technology\/hackers-can-use-chrome-sync-to-steal-passwords-through-extensions\/\">More<\/a><\/p>\n","protected":false},"author":10237,"featured_media":120553,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[805],"tags":[779],"class_list":{"0":"post-120552","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-news"},"acf":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/posts\/120552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/users\/10237"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/comments?post=120552"}],"version-history":[{"count":0,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/posts\/120552\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/media\/120553"}],"wp:attachment":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/media?parent=120552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/categories?post=120552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/tags?post=120552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}