Set as Homepage - Add to Favorites

九九视频精品全部免费播放-九九视频免费精品视频-九九视频在线观看视频6-九九视频这-九九线精品视频在线观看视频-九九影院

【Materialisation of Eroticism' in Sociology of the sacred】New 'browser syncjacking' cyberattack lets hackers take over your computer via Chrome

Hackers have Materialisation of Eroticism' in Sociology of the sacreddiscovered a new way to remotely take control of your computer — all through the Google Chrome web browser.

A report from cybersecurity company SquareX lays out the new multifaceted cyberattack, which the firm has dubbed "browser syncjacking."

Chrome profile takeover

At the core of the attack is a social engineering element, as the malicious actor first must convince the user to download a Chrome extension. The Chrome extension is usually disguised as a helpful tool that can be downloaded via the official Chrome Store. It requires minimal permissions, further cementing its perceived legitimacy to the user. According to SquareX, the extension actually does usually work as advertised, in order to further disguise the source of the attack from the user.

Meanwhile, secretly in the background, the Chrome extension connects itself to a managed Google Workspace profile that the attacker has set up in advance. With the user now unknowingly signed into a managed profile, the attacker sends the user to a legitimate Google support page which is injected with modified content through the Chrome extension, telling the user they need to sync their profile.

When the user agrees to the sync, they unwittingly send all their local browser data, such as saved passwords, browsing history, and autofill information, to the hacker's managed profile. The hacker can then sign into this managed profile on their own device and access all that sensitive information.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

Chrome browser takeover

The attack up to this point already provides the hacker with enough material to commit fraud and other illicit activities. However, browser syncjacking provides the hacker with the capability to go even further.

Using the teleconferencing platform Zoom as an example, SquareX explains that using the malicious Chrome extension, the attacker can send the victim to an official yet modified Zoom webpage that urges the user to install an update. However, the Zoom download that's provided is actually an executable file that installs a Chrome browser enrollment token from the hacker's Google Workspace.

After this occurs, the hacker then has access to additional capabilities and can gain access to the user's Google Drive, clipboard, emails, and more.

Device takeover

The browser syncjacking attack doesn't stop there. The hacker can take one further step in order to not just take over the victim's Chrome profile and Chrome browser, but also their entire device.

Through that same illicit download, such as the previously used Zoom update installer example, the attacker can inject a "registry entry to message native apps" by weaponizing Chrome’s Native Messaging protocol. By doing this, the attacker basically sets up a connection "between the malicious extension and the local binary." Basically, it creates a flow of information between the hacker's Chrome extension and your computer. Using this, the hacker can send commands to your device.

What can the hacker do from here? Pretty much anything they want. The attacker will have full access to the user's computer files and settings. They can create backdoors into the system. They can steal data such as passwords, cryptocurrency wallets, cookies, and more. In addition, they can track the user by controlling their webcam, take screenshots, record audio, and monitor everything input into the device.

As you can see, browser syncjacking is nearly completely unrecognizable as an attack to most users. For now, the most important thing you can do to protect yourself from such a cyberattack is to be aware of what you download and only install trusted Chrome extensions.


Featured Video For You
DeepSeek's privacy policy isn't so private

0.1786s , 10015.6015625 kb

Copyright © 2025 Powered by 【Materialisation of Eroticism' in Sociology of the sacred】New 'browser syncjacking' cyberattack lets hackers take over your computer via Chrome,Data News Analysis  

Sitemap

Top 主站蜘蛛池模板: 含羞草国产亚洲精品岁国产精品 | 国产一区二区精品在线观看 | 午夜视频在线免费 | 91国语精品自产拍在线观看 | 91九色精品国产自产精品 | 找老女人泻火 | 2025国产精品一卡2卡三卡4 | 欧美在线免费观看 | 日本免费人成视频在线观看 | 国产精品九九九午夜 | 口国产自 | 成人午夜试看120 | 一区二区视频免费观看 | 好看的电视剧全集免费在线观看 | 国产色精品vr一区二区 | 免费人成年短视频免费网站 | 精品免费播放视频 | 欧美国产精品不卡在线观看 | 亚洲国产日韩欧美综合a | 国产人妇三级视频在线观看 | 国产亚洲精品国产福利在线观看 | 成人乱码 | 日本欧美一区二区三区乱码 | 免费在线观 | 亚洲激情 | 中文字幕在线观看网站 | 午夜日韩欧美电影在线 | 在线看视频 | 国产偷窥女洗浴在线观看亚洲 | 天美传媒果冻传媒国产电影 | 美女视频性感网站 | 日韩欧美一区二区三区 | 日韩精品| 国产尤物亚洲精品不卡 | 18黑白丝| 国产一区二区三区日韩精品 | 亚洲人成网站77777免费 | 黑人巨茎| 成人黃色一級片 | 制服丝袜在线手机国产 | 亚洲国产一区二区午夜福利 |