By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
PulseReporterPulseReporter
  • Home
  • Entertainment
  • Lifestyle
  • Money
  • Tech
  • Travel
  • Investigations
Reading: New ‘browser syncjacking’ cyberattack lets hackers take over your laptop by way of Chrome
Share
Notification Show More
Font ResizerAa
PulseReporterPulseReporter
Font ResizerAa
  • Home
  • Entertainment
  • Lifestyle
  • Money
  • Tech
  • Travel
  • Investigations
Have an existing account? Sign In
Follow US
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
PulseReporter > Blog > Tech > New ‘browser syncjacking’ cyberattack lets hackers take over your laptop by way of Chrome
Tech

New ‘browser syncjacking’ cyberattack lets hackers take over your laptop by way of Chrome

Pulse Reporter
Last updated: February 5, 2025 11:28 pm
Pulse Reporter 4 months ago
Share
New ‘browser syncjacking’ cyberattack lets hackers take over your laptop by way of Chrome
SHARE


Contents
Chrome profile takeoverChrome browser takeoverGadget takeover

Hackers have found a brand new method to remotely take management of your laptop — all by means of the Google Chrome net browser.

A report from cybersecurity firm SquareX lays out the brand new multifaceted cyberattack, which the agency has dubbed “browser syncjacking.”

Chrome profile takeover

On the core of the assault is a social engineering component, because the malicious actor first should persuade the consumer to obtain a Chrome extension. The Chrome extension is often disguised as a useful instrument that may be downloaded by way of the official Chrome Retailer. It requires minimal permissions, additional cementing its perceived legitimacy to the consumer. In line with SquareX, the extension really does often work as marketed, with a purpose to additional disguise the supply of the assault from the consumer.

In the meantime, secretly within the background, the Chrome extension connects itself to a managed Google Workspace profile that the attacker has arrange upfront. With the consumer now unknowingly signed right into a managed profile, the attacker sends the consumer to a legit Google help web page which is injected with modified content material by means of the Chrome extension, telling the consumer they should sync their profile.

When the consumer agrees to the sync, they unwittingly ship all their native browser knowledge, similar to saved passwords, looking historical past, and autofill info, to the hacker’s managed profile. The hacker can then signal into this managed profile on their very own system and entry all that delicate info.

Mashable Mild Pace

Chrome browser takeover

The assault up so far already supplies the hacker with sufficient materials to commit fraud and different illicit actions. Nevertheless, browser syncjacking supplies the hacker with the aptitude to go even additional.

Utilizing the teleconferencing platform Zoom for instance, SquareX explains that utilizing the malicious Chrome extension, the attacker can ship the sufferer to an official but modified Zoom webpage that urges the consumer to put in an replace. Nevertheless, the Zoom obtain that is offered is definitely an executable file that installs a Chrome browser enrollment token from the hacker’s Google Workspace.

After this happens, the hacker then has entry to extra capabilities and may acquire entry to the consumer’s Google Drive, clipboard, emails, and extra.

Gadget takeover

The browser syncjacking assault does not cease there. The hacker can take one additional step with a purpose to not simply take over the sufferer’s Chrome profile and Chrome browser, but in addition their total system.

Via that very same illicit obtain, such because the beforehand used Zoom replace installer instance, the attacker can inject a “registry entry to message native apps” by weaponizing Chrome’s Native Messaging protocol. By doing this, the attacker principally units up a connection “between the malicious extension and the native binary.” Principally, it creates a circulation of data between the hacker’s Chrome extension and your laptop. Utilizing this, the hacker can ship instructions to your system.

What can the hacker do from right here? Just about something they need. The attacker can have full entry to the consumer’s laptop information and settings. They will create backdoors into the system. They will steal knowledge similar to passwords, cryptocurrency wallets, cookies, and extra. As well as, they’ll monitor the consumer by controlling their webcam, take screenshots, report audio, and monitor every thing enter into the system.

As you’ll be able to see, browser syncjacking is sort of fully unrecognizable as an assault to most customers. For now, a very powerful factor you are able to do to guard your self from such a cyberattack is to concentrate on what you obtain and solely set up trusted Chrome extensions.

Subjects
Cybersecurity
Google



You Might Also Like

Pocket is shutting down. Listed here are the read-later app alternate options.

Voicemod pronounces Key gaming console voice-changing tech

Neuralink desires its mind chip to manage a robotic arm subsequent

All of the Prime New Options in MacOS Sequoia

Squid Recreation Unleashed cell recreation debuts on December 17 forward of Squid Recreation 2 present

Share This Article
Facebook Twitter Email Print
Previous Article Walgreens, Optum Rx sued over loss of life; mother and father cite drug value Walgreens, Optum Rx sued over loss of life; mother and father cite drug value
Next Article Lin-Manuel Miranda On Why He Wasn’t Forged In Depraved Lin-Manuel Miranda On Why He Wasn’t Forged In Depraved
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Weekly Newsletter

Subscribe to our newsletter to get our newest articles instantly!

More News

What Elon Musk’s feud with Trump means for Tesla shareholders
What Elon Musk’s feud with Trump means for Tesla shareholders
4 minutes ago
Dakota Jokes “Madame Internet” Flop Was ‘Not Her Fault’
Dakota Jokes “Madame Internet” Flop Was ‘Not Her Fault’
38 minutes ago
These Really feel Like a Summer season Fling
These Really feel Like a Summer season Fling
55 minutes ago
The Thriller of iPhone Crashes That Apple Denies Are Linked to Chinese language Hacking
The Thriller of iPhone Crashes That Apple Denies Are Linked to Chinese language Hacking
57 minutes ago
DDG Claims Halle Bailey Is A "Danger" To Their Younger Son, After Sharing Alleged Texts From Her Threatening Self-Hurt
DDG Claims Halle Bailey Is A "Danger" To Their Younger Son, After Sharing Alleged Texts From Her Threatening Self-Hurt
2 hours ago

About Us

about us

PulseReporter connects with and influences 20 million readers globally, establishing us as the leading destination for cutting-edge insights in entertainment, lifestyle, money, tech, travel, and investigative journalism.

Categories

  • Entertainment
  • Investigations
  • Lifestyle
  • Money
  • Tech
  • Travel

Trending

  • What Elon Musk’s feud with Trump means for Tesla shareholders
  • Dakota Jokes “Madame Internet” Flop Was ‘Not Her Fault’
  • These Really feel Like a Summer season Fling

Quick Links

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Disclaimer
2024 © Pulse Reporter. All Rights Reserved.
Welcome Back!

Sign in to your account