News
Crypto users were left vulnerable via fake Google Chrome extension
Cryptocurrency users have discovered a malicious Google Chrome extension designed to steal funds by manipulating websites’ cookie data.
Binance trader “doomxbt” first noticed the issue in February after noticing losses of $70,000 related to suspicious activity. The attacker initially deposited the stolen funds on the AI-powered cryptocurrency exchange SideShift.
I’ve been compromised in some strange way and my @binance account was depleted, out of nowhere I heard sound notifications about orders being fulfilled when I never placed any – suddenly my amount of 70,000 was suddenly 0 on the screen pic.twitter.com/NEkSQVbBQc
— 𝔡𝔬𝔬𝔪 (@doomxbt) February 29, 2024
Tuesday was the culprit reportedly linked to a fake Aggr app extension on Google’s Chrome Store. Unlike the legitimate app Aggr which provides professional trading tools such as on-chain settlement trackers, the malicious version included code to collect all website cookies from users, allowing hackers to reconstruct passwords and user keys, especially for Binance accounts.
⚠️DO NOT DOWNLOAD THE AGGR CHROME EXTENSION⚠️
We finally found how @doomxbt lost his funds on Binance.
There is a malicious Aggr app on the Chrome Store with good reviews that steals all cookies on all websites you visit, and 2 months ago someone paid a handful of influencers… pic.twitter.com/XEPbwKX0XW— Tree (🌲,🌲) (@Tree_of_Alpha) May 28, 2024
Inadequate due diligence by cryptocurrency influencers or an elaborate scam?
Once the fake Aggr app was available on the Chrome Store, hackers launched a social media campaign to encourage downloads.
The developers hired a network of influencers to promote the malicious software in a process known as “shilling.” Social media accounts populated timelines with commercial buzzwords to convince users that the tool was needed.
In this case, these influencers have forgotten the popular crypto chant “do your research” AKA “DYOR”, or have ignored it. It is not known whether the promoters knew that the fake Aggr made users vulnerable or whether the social media accounts profited from the attack.
Following the incident, crypto.news reached out to a few promoters for comment, but at least one blocked the request.
This incident is part of a larger trend, as similar attacks using Chrome extensions have occurred recently. Last month, a trader lost over $800,000 in digital assets interacting with two malicious Chrome browser extensions. DYOR e users are advised to double-check any application before downloading it onto their devices.
At first glance the extension is mostly harmless, importing a small “background.js” file and the popular “jquery” javascript extension. pic.twitter.com/lxFcSvxP4V
— Tree (🌲,🌲) (@Tree_of_Alpha) May 28, 2024