
Cyberhaven Chrome Extension Hit by Sophisticated Facebook Data Phishing Attack
A sophisticated phishing attack on December 24, 2024, led to the compromise of Cyberhaven’s Chrome extension through unauthorized access to their Google Chrome Web Store account. Despite having advanced security measures in place, including Google Advanced Protection and MFA, the attackers successfully uploaded a malicious version 24.10.4 of the extension, specifically targeting Facebook users for data extraction.
Table of Contents
Key Takeaways:
- A targeted phishing attack compromised Cyberhaven’s Chrome extension through Google Chrome Web Store access
- The malicious version collected Facebook user data and business account information during a 25-hour window
- Attackers bypassed 2FA security measures without triggering standard authentication prompts
- The incident was part of a larger campaign targeting multiple Chrome extension developers
- Cyberhaven’s security team removed the compromised extension within 60 minutes of detection
Understanding the Attack Vector
The breach began with a targeted phishing operation against a Cyberhaven employee with access to the Google Chrome Web Store developer account. This incident raises significant concerns about the security review process within the Chrome Web Store. The attack succeeded despite the presence of Google Advanced Protection, suggesting a sophisticated bypass of standard security protocols.
Malicious Payload Analysis
The compromised extension contained modified code in its worker.js file that established communication with a command and control server at cyberhavenext[.]pro. The malicious content.js file specifically targeted Facebook.com users, collecting sensitive data including:
- Facebook access tokens
- User identification information
- Business account details
- Advertisement account data
- Browser cookies and user agent strings
Impact and Timeline
The malicious Chrome extension was active for approximately 25 hours, from 1:32 AM UTC on December 25 to 2:50 AM UTC on December 26. Only users with Chrome-based browsers that auto-updated during this period were affected. The incident was isolated to version 24.10.4, with no compromise of other Cyberhaven systems or infrastructure.
Detection and Response
Cyberhaven’s security team demonstrated quick response capabilities by detecting the compromise at 11:54 PM UTC on December 25. The team’s swift action resulted in the removal of the malicious package within 60 minutes of detection. I recommend using automation tools like Latenode to enhance security monitoring and response times for similar incidents.
Security Implications and Future Measures
This incident highlights critical vulnerabilities in extension distribution platforms and the necessity for enhanced security measures. The successful bypass of 2FA protection emphasizes the need for additional security layers beyond standard authentication methods. Organizations must implement continuous monitoring systems and maintain rapid incident response capabilities to minimize potential damage from similar attacks.
11 thoughts on “Cyberhaven Chrome Extension Hit by Sophisticated Facebook Data Phishing Attack”