Want to stop Browser Syncjacking and other extension-based attacks? Learn the best practices for defending your enterprise against malicious extensions in our guide.
Today, anyone can purchase a new domain, and associate it with a Google Workspace account. They can then create hundreds of managed profiles. The barrier to create a simple extension using AI tools and uploading them on the Chrome store is fairly low and accessible to all internet users. This makes it impossible to attribute these attacks.
This attack only requires basic permissions which users are accustomed to and required by most browser extensions, including popular productivity tools like Grammarly, Loom and Calendly. Thus, virtually any extension on the browser could be used as a medium for this exploit. Also, since the malicious activity is only revealed at run time, static analysis tools won’t identify anything suspicious in the extension code.
The whole attack sequence, from syncing to downloading the malicious executable, only involves legitimate sites. Thus, it will not be flagged by any proxy-based solutions or URL filtering, nor will it raise any suspicion among victims, even if the content has been altered by the malicious extension.
Unlike many extensions-based attacks which require elaborate social engineering, this attack only involves a small yet clever social engineering step. Much of the attack runs automatically with nearly no user interaction, giving the attacker control over the majority of the attack sequence once the extension is installed.
For a regular user, there is no telltale sign that a privilege escalation has occurred. Unless the victim actively navigates to the Chrome profile regularly to check for managed profiles, there is no visible difference in the user interface once a managed profile is added. Similarly, there is no change in the user interface between a managed and unmanaged browser.
Once device control is achieved, the attacker's capabilities become virtually unlimited. The attacker can exfiltrate confidential data from both web and native apps, turn on cameras and microphone for surveillance, disable security features and even install further malicious extensions or malware without the victim's permission.
The malicious extensions used to execute Browser Syncjacking operate fully in the browser and cannot be identified by permissions or involved sites. Thus, the attack can only be mitigated with a browser-native solution that truly understands the runtime behaviour of each extension.
Click below to request a pilot, or contact us at founder@sqrx.com to learn more.