Category: Uncategorized

  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

    Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites


    Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials.

    The extensions are advertised as a “multi-location network speed test plug-in” for developers and foreign trade personnel. Both the browser add-ons are available for download as of writing. The details of the extensions are as follows –

    • Phantom Shuttle (ID: fbfldogmkadejddihifklefknmikncaj) – 2,000 users (Published on November 26, 2017)
    • Phantom Shuttle (ID: ocpcmfmiidofonkbodpdhgddhlcmcofd) – 180 users (Published on April 27, 2023)

    “Users pay subscriptions ranging from ¥9.9 to ¥95.9 CNY ($1.40 to $13.50 USD), believing they’re purchasing a legitimate VPN service, but both variants perform identical malicious operations,” Socket security researcher Kush Pandya said.

    “Behind the subscription facade, the extensions execute complete traffic interception through authentication credential injection, operate as man-in-the-middle proxies, and continuously exfiltrate user data to the threat actor’s C2 [command-and-control] server.”

    Once unsuspecting users make the payment, they receive VIP status and the extensions auto-enable “smarty” proxy mode, which routes traffic from over 170 targeted domains through the C2 infrastructure.

    Cybersecurity

    The extensions work as advertised to reinforce the illusion of a functional product. They perform actual latency tests on proxy servers and display connection status, while keeping users in the dark about their main goal, which is to intercept network traffic and steal credentials.

    This involves malicious modifications prepended to two JavaScript libraries, namely, jquery-1.12.2.min.js and scripts.js, that come bundled with the extensions. The code is designed to automatically inject hard-coded proxy credentials (topfany / 963852wei) into every HTTP authentication challenge across all websites by registering a listener on chrome.webRequest.onAuthRequired.

    “When any website or service requests HTTP authentication (Basic Auth, Digest Auth, or proxy authentication), this listener fires before the browser displays a credential prompt,” Pandya explained. “It immediately responds with the hardcoded proxy credentials, completely transparent to the user. The asyncBlocking mode ensures synchronous credential injection, preventing any user interaction.”

    Once users authenticate to a proxy server, the extension configures Chrome’s proxy settings using a Proxy Auto-Configuration (PAC) script to implement three modes –

    • close, which disables the proxy feature
    • always, which routes all web traffic through the proxy
    • smarty, which routes a hard-coded list of more than 170 high-value domains through the proxy

    The list of domains includes developer platforms (GitHub, Stack Overflow, Docker), cloud services (Amazon Web Services, Digital Ocean, Microsoft Azure), enterprise solutions (Cisco, IBM, VMware), social media (Facebook, Instagram, Twitter), and adult content sites. The inclusion of pornographic sites is likely an attempt to blackmail victims, Socket theorized.

    The net result of this behavior is that user web traffic is routed through threat actor-controlled proxies while the extension maintains a 60-second heartbeat to its C2 server at phantomshuttle[.]space, a domain that remains operational. It also grants the attacker a “man-in-the-middle” (MitM) position to capture traffic, manipulate responses, and inject arbitrary payloads.

    More importantly, the heartbeat message transmits a VIP user’s email, password in plaintext, and version number to an external server via an HTTP GET request every five minutes for continuous credential exfiltration and session monitoring.

    “The combination of heartbeat exfiltration (credentials and metadata) plus proxy MitM (real-time traffic capture) provides comprehensive data theft capabilities operating continuously while the extension remains active,” Socket said.

    Cybersecurity

    Put differently, the extension captures passwords, credit card numbers, authentication cookies, browsing history, form data, API keys, and access tokens from users accessing the targeted domains while VIP mode is active. What’s more, the theft of developer secrets could pave the way for supply chain attacks.

    It’s currently not known who is behind the eight-year-old operation, but the use of Chinese language in the extension description, the presence of Alipay/WeChat Pay integration to make payments, and the use of Alibaba Cloud to host the C2 domain points to a China-based operation.

    “The subscription model creates victim retention while generating revenue, and the professional infrastructure with payment integration presents a facade of legitimacy,” Socket said. “Users believe they’re purchasing a VPN service while unknowingly enabling complete traffic compromise.”

    The findings highlight how browser-based extensions are becoming an unmanaged risk layer for enterprises. Users who have installed the extensions are advised to remove them as soon as possible. For security teams, it’s essential to deploy extension allowlisting, monitor for extensions with subscription payment systems combined with proxy permissions, and implement network monitoring for suspicious proxy authentication attempts.



    Source link

  • Donald Trump travelled on Epstein’s plane more than previously thought, prosecutor says

    Donald Trump travelled on Epstein’s plane more than previously thought, prosecutor says


    Alex Smithand

    Anthony Reuben,BBC Verify

    Davidoff Studios/Getty Images Jeffrey Epstein and Donald Trump pose for photo togetherDavidoff Studios/Getty Images

    A file photo of Jeffrey Epstein and Donald Trump, then a real estate developer, at Trump’s Mar-a-Lago estate in Palm Beach, Florida in 1997

    US President Donald Trump was listed as a passenger on the private jet of late convicted sex offender Jeffrey Epstein eight times between 1993 and 1996, a new email released by the US Department of Justice (DOJ) says.

    “Donald Trump traveled on Epstein’s private jet many more times than previously has been reported (or that we were aware),” reads the 7 January 2020 email from an assistant US attorney.

    Trump’s name on the flight record does not indicate wrongdoing. In 2024, Trump wrote: “I was never on Epstein’s Plane”. He has denied any wrongdoing in relation to Epstein.

    The DOJ says some files released on Tuesday “contain untrue and sensationalist claims” against Trump.

    Trump was a friend of Epstein’s for years, but the president has said they fell out in about 2004 – years before Epstein was first arrested.

    The latest release of documents – running to more than 30,000 pages – is part of the so-called Epstein files the DOJ was legally required to publish in their entirety by last Friday.

    In a statement on Tuesday, the DOJ said: “Some of these documents contain untrue and sensationalist claims made against President Trump that were submitted to the FBI right before the 2020 election. To be clear: the claims are unfounded and false, and if they had a shred of credibility, they certainly would have been weaponized against President Trump already.”

    “Nevertheless, out of our commitment to the law and transparency, the DOJ is releasing these documents with the legally required protections for Epstein’s victims,” the DOJ statement on X said.

    The prosecutor’s email was sent on 7 January 2020 and is part of an email chain which includes the subject heading: “RE: Epstein flight records.”

    The sender and recipient are redacted, but the bottom of the email says assistant US attorney, Southern District of New York – with the name redacted.

    The email states that Trump “is listed as a passenger on at least eight flights between 1993 and 1996, including at least four flights on which [Epstein’s associate Ghislaine] Maxwell was also present. He is listed as having traveled with, among others and at various times, Marla Maples, his daughter Tiffany, and his son Eric.”

    “On one flight in 1993, he and Epstein are the only two listed passengers; on another, the only three passengers are Epstein, Trump, and then-20-year-old…” – the rest of the sentence has been redacted.

    It continues: “On two other flights, two of the passengers, respectively, were women who would be possible witnesses in a Maxwell case.”

    In 2022, Ghislaine Maxwell was sentenced to 20 years in prison for crimes including conspiracy to entice minors to travel to engage in illegal sex acts and sex trafficking of a minor.

    Epstein died in a New York prison cell in 2019 as he awaited his trial on sex trafficking charges.

    US Department of Justice Extracts from the 2020 email, released by the US Department of Justice. Text: On Jan 7, 2020, at 7:56 PM, > wrote: For your situational awareness, wanted to let you know that the flight records we received yesterday reflect that Donald Trump traveled on Epstein's private jet many more times than previously has been reported (or that we were aware), including during the period we would expect to charge in a Maxwell case. In particular, he is listed as a passenger on at least eight flights between 1993 and 1996, including at least four flights on which Maxwell was also present. He is listed as having traveled with, among others and at various times, Marla Maples, his daughter Tiffany, and his son Eric. On one flight in 1993, he and Epstein are the only two listed passengers; on another, the only three passengers are Epstein, Trump, and the 20-year-old... On two other flights, two of the passengers, respectively, were women who would be possible witnesses in a Maxwell case."US Department of Justice

    An extract from the 2020 email, released by the US Department of Justice

    The prosecutor’s email does not provide more details about the flights.

    A handwritten flight log released by the DOJ in February appears to have many entries which are difficult to read.

    However, one lists Donald Trump, as well as his son Eric, for a flight on 13 August 1995 from PBI (Palm Beach International Airport in Florida) to TEB (Teterboro Airport in New Jersey). It also lists

    Tuesday’s release of files related to Epstein is the largest so far – but many more documents held by the DOJ are yet to be made public. Several thousand files have been published across eight batches since Friday.

    The DOJ missed last Friday’s deadline set by Congress to publish all its files related to Epstein – including photos, videos and investigative materials.

    The department has faced criticism from survivors and lawmakers from across the aisle for its failure to meet that deadline.

    Deputy Attorney General Todd Blanche said on the day of the deadline that not all the files would be made public immediately, and that more would be published over the coming weeks.

    “There’s a lot of eyes looking at these, so we want to make sure that when we do produce the materials that we’re producing, we’re protecting every single victim,” he said on Friday.



    Source link

  • Gunmen abduct Muslim travellers in Plateau state

    Gunmen abduct Muslim travellers in Plateau state


    A journalist based in Plateau state said the families of the latest victims had begun receiving ransom demands.

    The police have not said anything about the identity of the possible perpetrators.

    Kidnapping for ransom by criminal gangs, known locally as bandits, has become common across parts of northern and central Nigeria.

    Although the handing over of cash in order to release those being held is illegal, it is thought that this is how many cases are resolved and seen as a way for these gangs to raise money.

    The incident in Plateau state is unrelated to the long-running Islamist insurgency in the country’s north-east, where jihadist groups have been battling the state for more than a decade.

    The insecurity in Nigeria received renewed international attention in November after US President Donald Trump threatened to send troops to “that now disgraced country, ‘guns-a-blazing’”. He alleged that Christians were being targeted.

    Nigeria’s federal government has acknowledged the security problems but has denied that Christians are being singled out.

    On Monday, Information Minister Mohammed Idris said that recent tensions with the US over insecurity and alleged persecution of Christians had been “largely resolved”, resulting in stronger relations with Washington.

    He added that trained and equipped forest guards will be deployed to secure forests and other remote areas used as hideouts by criminal groups to supplement army operations.

    Additional reporting by Abayomi Adisa and BBC Monitoring



    Source link