Criminals infected more than 100,000 computers with browser extensions that stole login credentials, surreptitiously mined cryptocurrencies, and engaged in click fraud. The malicious extensions were hosted in Google’s official Chrome Web Store.
The scam was active since at least March with seven malicious extensions known so far, researchers with security firm Radware reported Thursday. Google's security team removed five of the extensions on its own and removed two more after Radware reported them. In all, the malicious add-ons infected more than 100,000 users, at least one inside a "well-protected network" of an unnamed global manufacturing firm, Radware said.
Google manages to proactively detect and remove many malicious extensions, as evidenced by Radware's finding that five of the seven extensions it discovered were no longer available in the Chrome Web Store. But the regular success attackers enjoy all but guarantees the rash of bad extensions will continue.
"As this malware spreads, the group will continue to try to identify new ways to utilize the stolen assets," Radware researchers Adi Raff and Yuval Shapira wrote on Thursday, referring to the criminals behind the latest batch of extensions. "Such groups continuously create new malware and mutations to bypass security controls."
A Google spokeswoman said company employees removed the extensions from the Chrome Web Store and infected users' browsers within hours of receiving the report.
The extensions were being pushed in links sent over Facebook that led people to a fake YouTube page that asked for an extension to be installed. Once installed, the extensions executed JavaScript that made the computers part of a botnet. The botnet stole Facebook and Instagram credentials and collected details from a victim's Facebook account. The botnet then used that pilfered information to send links to friends of the infected person. Those links pushed the same malicious extensions. If any of those friends followed the link, the whole infection process started all over again.
The botnet also installed cryptocurrency miners that mined the monero, bytecoin, and electroneum digital coins. Over the past six days, the attackers appeared to generate about $1,000 in digital coin, mostly in monero. To prevent users from removing the malicious extensions, the attackers automatically closed the extensions tab each time it was opened and blacklisted a variety of security tools provided by Facebook and Google.
The extensions came to the attention of Radware researchers through machine-learning algorithms that analyzed communication logs of the protected network that was infected. The Radware researchers said they believe the group behind the extensions has never been detected before. Given the regular success in getting malicious extensions hosted in the Chrome Web Store, it wouldn't be surprising if the group strikes again.