Chrome Extensions Turned Attack Vectors: What to Do Right Now
Chrome Extensions Turned Attack Vectors: What to Do Right Now Even useful browser extensions can become a hidden threat. Recent reports from Security Boulevard and other security outlets describe a campaign in which seemingly legitimate productivity extensions for Chrome were used as backdoors to infiltrate enterprise systems. The attack relied on a supply-chain compromise—attackers injected malicious code into extensions that appeared normal, then distributed them through official channels. If you use Chrome at work or even at home, understanding how this happened and what you can do about it is worth a few minutes of your time. ...