Home / Malware / Whatever you do, avoid this free browser extension – It's hiding … – Komando

Whatever you do, avoid this free browser extension – It's hiding … – Komando

Falling victim to a phishing attack can have several frightening results. Clicking on a phishing email’s links can lead to your gadget being infected with malware, ransomware or even lead to identity theft to name a few.

It’s bad enough when one person has to suffer the consequences of an attack. Imagine if an entire company and its clients were impacted. This actually happened after a recent attack.

Cybercriminals take control of Chrome extension

What we’re talking about is the Copyfish extension for the Chrome browser. Last week, cybercriminals were able to trick an employee of the extension’s publisher, A9t9, with a phishing email.

The employee received an email that was purported to be from Google. The email stated that A9t9 needed to update Copyfish immediately or it would be removed from the Chrome Web Store. There was a link in the email that said, “Click here to read more details.”

If you guessed that the link was malicious, you’re right. It opened a spoofed Google sign-in page, where the unsuspecting employee entered the password for the developers’ account.

The following day the Copyfish extension was updated, and not by the developer. Instead, it was updated by the cybercriminals who stole the password through the phishing email. The updated version of Copyfish began inserting ads/spam into websites.

Once A9t9 realized it was their extension causing spam to appear, they tried logging into the developer account to fix it. They were not successful. The hackers have taken control of the account and blocked A9t9 from accessing it.

In a statement, A9t9 said, “We logged into our developer account and boom – our Copyfish extension is gone! It seems the hackers moved it to THEIR developer account. We currently have no access to it!

“So far, the update looks like standard adware hack, but, as we still have no control over Copyfish, the thieves might update the extension another time…until we get it back. We can not even disable it – as it is no longer in our developer account.”

The company has notified Google of the situation and its developer support is working on a fix.

This incident shows how important it is to be able to recognize phishing attacks. Keep reading for some suggestions.

How to protect against phishing attacks:

More stories you can’t miss:

Common security risks every smartphone user should know about

Test your firewall to make sure it’s working

Google’s tracking practices spark serious privacy concerns


Source link

About admin

Check Also

Cobalt malware leverages recently patched 17-year-old Microsoft flaw – SC Magazine

Cobalt malware spotted in recent spam campaign Cobalt malware was documented exploiting the 17-year-old CVE-2017-11882 …

Leave a Reply

Your email address will not be published. Required fields are marked *