By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
Tech News

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

By Viral Trending Content 3 Min Read
Share
SHARE

Mar 10, 2025Ravie LakshmananCybersecurity / Malware

Clones Browser Extensions

Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on.

“The polymorphic extensions create a pixel perfect replica of the target’s icon, HTML popup, workflows and even temporarily disables the legitimate extension, making it extremely convincing for victims to believe that they are providing credentials to the real extension,” SquareX said in a report published last week.

The harvested credentials could then be abused by the threat actors to hijack online accounts and gain unauthorized access to sensitive personal and financial information. The attack affects all Chromium-based web browsers, including Google Chrome, Microsoft Edge, Brave, Opera, and others.

The approach banks on the fact that users commonly pin extensions to the browser’s toolbar. In a hypothetical attack scenario, threat actors could publish a polymorphic extension to the Chrome Web Store (or any extension marketplace) and disguise it as a utility.

Cybersecurity

While the add-on provides the advertised functionality so as to not arouse any suspicion, it activates the malicious features in the background by actively scanning for the presence of web resources that correlate to specific target extensions using a technique called web resource hitting.

Once a suitable target extension is identified, the attack moves to the next stage, causing it to morph into a replica of the legitimate extension. This is accomplished by changing the rogue extension’s icon to match that of the target and temporarily disabling the actual add-on via the “chrome.management” API, which leads to it being removed from the toolbar.

“The polymorphic extension attack is extremely powerful as it exploits the human tendency to rely on visual cues as a confirmation,” SquareX said. “In this case, the extension icons on a pinned bar are used to inform users of the tools they are interacting with.”

The findings come a month after the company also disclosed another attack method called Browser Syncjacking that makes it possible to seize control of a victim’s device by means of a seemingly innocuous browser extension.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

5 new WhatsApp Features you Should Start Using

10 Hidden iOS 26.4 Features You Should Be Using on Your iPhone

File read flaw in Smart Slider plugin impacts 500K WordPress sites

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

Why cybersecurity needs to adapt in the age of AI

TAGGED: browser security, Cyber Security, Cybersecurity, data breach, Google Chrome, Internet, Malware, Microsoft Edge, online privacy, phishing, Threat Intelligence, web security
Share This Article
Facebook Twitter Copy Link
Previous Article PM Modi Ahead Of Mauritius Visit
Next Article Kingdom Come: Deliverance 2 – Patch 1.2 Goes Live on March 13th
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

5 new WhatsApp Features you Should Start Using
Tech News
10 Hidden iOS 26.4 Features You Should Be Using on Your iPhone
Tech News
File read flaw in Smart Slider plugin impacts 500K WordPress sites
Tech News
Closing the ‘deterrence gap’: German military association calls for war economy
Business
Chelsea problems on the pitch are clear in recent stats lists – opinion
Sports
Market trading guide: Buy ACME Solar and Dalmia Bharat on Monday for short-term gains up to 16%. Here’s why
Business
EU ministers weigh oil price cap and windfall tax to rein in soaring energy costs
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

5 new WhatsApp Features you Should Start Using

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
5 new WhatsApp Features you Should Start Using
March 29, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?