Cyberhaven and the Chrome Extension Breach: Lessons from a Sophisticated Phishing Attack

Image

Google Chrome remains the most widely used browser globally, with approximately 3.44 billion active users , accounting for 64.38% of internet users worldwide. A significant part of its appeal lies in its robust extension ecosystem , with millions of users customising their browsing experience using these tools. Popular extensions such as AdBlock (57,000,000 users) and LastPass (8,000,000 users) have become household names due to their utility. 

However, the very flexibility that makes Chrome extensions so useful also introduces risks. Malicious actors have long targeted extensions to exploit their permissions, enabling data theft, credential harvesting, and even system compromise. A phishing attack  uncovered in December 2024 has once again highlighted these risks, exposing both developers and users to significant threats. 

What Happened: The Cyberhaven Chrome Extension Breach  

In December 2024, cybersecurity researchers from ExtensionTotal  and independent analysts uncovered a breach affecting 35 Chrome extensions , compromising the security of approximately 2.6 million users . The attack stemmed from a sophisticated phishing campaign targeting extension developers

Among the 35 compromised extensions, some of the most popular included Cyberhaven Security Extension  (approximately 400,000 users ) and VPNCity  (over 50,000 users ). 

Cyberhaven is a data loss prevention (DLP) tool designed for enterprise environments . The breach was first detected when users noticed unusual behaviour in one of the affected extensions. This behaviour included unauthorised data exfiltration targeting Facebook authentication tokens and cookies, as well as unexpected account activities. These irregularities prompted an investigation by ExtensionTotal, a browser security monitoring platform.

The attackers used fake Google login pages  to trick developers into divulging their credentials. Developers received emails falsely claiming their extensions violated Chrome Web Store policies. These messages directed recipients to a counterfeit "Go To Policy" page, which mimicked a legitimate Google login screen. Upon entering their credentials, the attackers gained full access to the developers’ accounts. 

Once inside, the attackers uploaded malicious updates to the extensions, turning trusted tools into data-stealing mechanisms. These compromised extensions harvested sensitive user data , including Facebook login credentials and browser cookies. This meant that anyone who installed these extensions risked having their Facebook accounts accessed without their permission. Attackers could potentially take over these accounts to post unauthorised content, send messages, or change account settings, creating significant risks for affected users. 

This incident raised concerns about Chrome’s defences, particularly the ability of attackers to bypass certain security protocols, highlighting the need for enhanced safeguards. The attack has serious implications for organizations that rely on extensions to secure their data, monitor user activity, or facilitate secure browsing. As companies increasingly adopt cloud-based tools and integrated work environments, the breach of a critical extension like Cyberhaven exposes corporate networks to substantial risks. A compromised extension may not only affect individual users but could also open broader attack vectors within an organization. 

Affected Extensions  

Dan Goodin, Senior Security Editor at Ars Technica, compiled a list of the affected extensions. The following table lists 33 extensions that were compromised, affecting millions of users. This list includes both extensions like Cyberhaven , which is critical for enterprise security, and other popular tools used by individual users. 

Name  

ID  

Version  

Patch Available  

Users  

Start Date  

End Date  

VPNCity 

nnpnnpemnckcfdebeekibpiijlicmpom 

2.0.1 

FALSE 

10,000 

12/12/24 

12/31/24 

Parrot Talks 

kkodiihpgodmdankclfibbiphjkfdenh 

1.16.2 

TRUE 

40,000 

12/25/24 

12/31/24 

Uvoice 

oaikpkmjciadfpddlpjjdapglcihgdle 

1.0.12 

TRUE 

40,000 

12/26/24 

12/31/24 

Internxt VPN 

dpggmcodlahmljkhlmpgpdcffdaoccni 

1.1.1 

1.2.0 

10,000 

12/25/24 

12/29/24 

Bookmark Favicon Changer 

acmfnomgphggonodopogfbmkneepfgnh 

4.00 

TRUE 

40,000 

12/25/24 

12/31/24 

Castorus 

mnhffkhmpnefgklngfmlndmkimimbphc 

4.40 

4.41 

TRUE 

50,000 

12/26/24 

Wayin AI 

cedgndijpacnfbdggppddacngjfdkaca 

0.0.11 

TRUE 

40,000 

12/19/24 

12/31/24 

Search Copilot AI Assistant for Chrome 

bbdnohkpnbkdkmnkddobeafboooinpla 

1.0.1 

TRUE 

20,000 

7/17/24 

12/31/24 

VidHelper - Video Downloader 

egmennebgadmncfjafcemlecimkepcle 

2.2.7 

TRUE 

20,000 

12/26/24 

12/31/24 

Cyberhaven security extension V3  

pajkjnmeojmbapicmbpliphjmcekeaac 

24.10.4 

24.10.5 

TRUE 

400,000 

12/24/24 

One of the compromised extensions, Reader Mode , was part of a separate campaign that began as early as April 2023. The source of the compromise appears to be a code library that developers can use to monetize their extensions. This library collects data about each web visit made by the user, in exchange for which the developers receive a commission. This compromise affected several other extensions as well. 

Name  

ID  

Version  

Patch Available  

Users  

Start Date  

End Date  

Reader Mode 

llimhhconnjiflfimocjggfjdlmlhblm 

1.5.7 

FALSE 

300,000 

12/18/24 

12/19/24 

Tackker - online keylogger tool 

ekpkdmohpdnebfedjjfklhpefgpgaaji 

1.3 

1.4 

TRUE 

10,000 

10/6/23 

AI Shop Buddy 

epikoohpebngmakjinphfiagogjcnddm 

2.7.3 

TRUE 

4,000 

4/30/24 

Rewards Search Automator 

eanofdhdfbcalhflpbdipkjjkoimeeod 

1.4.9 

TRUE 

100,000 

5/4/24 

ChatGPT Assistant - Smart Search 

bgejafhieobnfpjlpcjjggoboebonfcg 

1.1.1 

TRUE 

189 

2/12/24 

The Reader Mode  extension is one of 13 Chrome extensions known to have used this library to collect potentially sensitive data. These extensions collectively had 1.14 million installations. 

Key Learnings and How to Protect Yourself  

The attack serves as a stark reminder of the vulnerabilities in software ecosystems and offers critical insights for developers, security professionals, and end-users  alike. Here are some actionable steps: 

For Developers  

  1. Strengthen Authentication Measures:  Use hardware-based two-factor authentication (e.g., YubiKeys) for robust protection against phishing and SIM-swapping attacks. Regularly review and update account credentials to minimise vulnerabilities.  

  2. Be Wary of Phishing Attempts:  Scrutinise any communication claiming to be from official sources like Google. Avoid clicking on links in emails and instead, navigate directly to the official platform to verify any claims.  

  3. Monitor Extension Activity:  Conduct regular audits of your extension’s codebase to detect unauthorised changes. Implement automated alerts for suspicious logins or account activity within developer environments. 

For Security Professionals  

  1. Educate End-Users:  Raise awareness about the risks of browser extensions and provide clear guidelines for safe usage. Encourage minimising the number of installed extensions and verifying their necessity to reduce the attack surface.  

  2. Conduct Regular Security Reviews:  Periodically review permissions granted to browser extensions in corporate environments. Employ endpoint monitoring tools to detect and respond to malicious browser activities effectively.  

  3. Collaborate with Platforms:  Partner with browser vendors like Google to enhance extension security protocols and streamline reporting mechanisms for malicious activities. Advocate for stricter vetting processes and transparent communication channels between developers and users. 

For End-Users  

  1. Audit Installed Extensions:  Regularly review your installed extensions and remove any that are unnecessary. Ensure that the remaining extensions are from verified developers. Cross-check extensions with reputable security reports to identify and eliminate compromised or malicious add-ons.  

  2. Monitor Account Activity:  Keep a close watch on your account activity, especially on sensitive platforms like email or social media. Detecting unauthorised access or unusual behaviour should prompt immediate password updates and further investigation into the compromise. 

Conclusion  

While browser extensions offer significant utility, The Chrome extension phishing attack underscores vulnerabilities that can be exploited by malicious actors. By adopting robust security measures and maintaining vigilance, developers, security professionals, and end-users can minimise their exposure to such risks. 

As the threat landscape evolves, proactive security practices and collaboration between stakeholders will be key to protecting against similar attacks in the future. 

About the Author

James Greening , operating under a pseudonym, brings a wealth of experience to his role. Formerly the sole driving force behind Fake Website Buster, James leverages his expertise to raise awareness about online scams. He currently serves as a Content Marketing & Design Specialist for the Global Anti-Scam Alliance (GASA), and contributes to ScamAdviser.com .

James’s mission aligns with GASA’s mission to protect consumers worldwide from scams. He is committed to empowering professionals with the insights and tools necessary to detect and mitigate online scams, ensuring the security and integrity of their operations and digital ecosystems.

Connect with James Greening on LinkedIn

Jan 8, 2025
9 minute read
Category
Scam Trends Topic - Scam Detection Industry - Big Tech / Social Media
Written by
Jorij Abraham
Managing Director
Share article

Latest blogs & research

Romance scams continue to grow worldwide, exploiting trust, emotional vulnerability, and online relationships to manipulate victims into financial and emotional harm. Timed around Brazil’s Valentine’s Day period, the latest GASA meet-up, Golpes do Amor — Como eles acontecem e como se proteger, explored how these scams operate, why they are so effective, and how individuals can better recognise warning signs before becoming victims.  Hosted by the Brazil Chapter of the Global Anti-Scam Alliance (GASA), the discussion highlighted findings from O Estado dos Golpes no Brasil. According to the report, romance scams have already affected 18 per cent of surveyed Brazilian adults, while 6 per cent of victims reported falling for this type of scam more than once. Beyond financial losses, speakers emphasised the severe emotional consequences victims often experience, including shame, trauma, and loss of trust.  Read the Report – O Estado dos Golpes no Brasil  Speakers: Rose Leonel, Journalist and Founder – ONG Marias da Internet Tanila Savoy, Founder – Associação Nacional de Vítimas da Internet (ANVINT) Lisandréa Salvariego Colabuono, Police Chief and Coordinator – NOAD, Polícia Civil de São Paulo Renata Salvini, Brazil Chapter Director – Global Anti-Scam Alliance  A major focus of the discussion was the manipulation techniques commonly used in romance scams. Speakers explained how scammers frequently create convincing identities, often pretending to be foreigners, military personnel, or individuals living abroad, while avoiding in-person meetings and building emotional dependency over time. Urgency and financial pressure were highlighted as major warning signs, particularly when victims are pushed to act quickly or send money under emotional circumstances.  The webinar also explored the lasting psychological impact of these crimes and reinforced that victims should never be blamed. Rose Leonel shared her personal story of transforming trauma into advocacy after becoming a victim of non-consensual intimate image sharing, an experience that ultimately contributed to the creation of the Rose Leonel Law in Brazil. Speakers stressed the importance of reporting scams, noting that even small details can assist investigations and help prevent future victims.  The conversation reinforced the need for greater public awareness, victim support, and collaboration between civil society, law enforcement, and digital platforms to address emotionally manipulative fraud more effectively. Through initiatives like this meet-up, GASA continues working with experts and organisations worldwide to strengthen scam prevention and support victims of online fraud.  Watch the full discussion below to learn how individuals and organisations can better recognise and respond to romance scams.

Romance Scams in Brazil: Warning Signs and Prevention

Experts from Brazil discuss how romance scams work, their emotional impact, and how victims can protect themselves online.

Topic - Scam Awareness Video Event - GASA Meet-Ups Industry - Law Enforcement
Acción coordinada. Impacto real. México lidera el cambio

De Viena a la Acción: GASA México y UNODC México Cierran Brechas Operativas

GASA México y UNODC México formalizan un Acuerdo de Intercambio de Comunicaciones, convirtiendo los compromisos globales de Viena en acción coordinada contra el fraude.

News Topic - Fraud Policy Industry - Policy Makers Region - Latin America
un global fraud summit what comes next discussions

What the UN Global Fraud Summit Discussions Tell Us About What Comes Next

Watch expert discussions from the UN Global Fraud Summit on the industrialisation of fraud, global collaboration, public–private frameworks, and next steps for implementation.

Best Practices Industry - National Cyber Security Centers (NCSCs) Region - Europe Region - Global
gasa webinar

Game Over for Scammers: Regional Defenses Against Online Gambling–Related Scams

Experts from INTERPOL, ACMA, and DGOJ examine how gambling-related scams operate and how global enforcement is responding.

Region - Europe Video Topic - Fraud Policy Event - GASA Meet-Ups
22,000 Fraud Signals Bank Attack Trends – March 2026

What 22,000 Fraud & Cyber Crime Operator Signals Reveal About the State of Bank Attacks

Falkin's analysis of 22,661 fraud operator signals shows how bank attacks are evolving across regions, typologies, and AI-driven scam infrastructure.

Research Region - Global Scam Trends Topic - Fraud Research
Microsoft White Paper  on Link Analysis and Digital Fingerprinting in Fraud Detection

Reinventing Fraud Detection Through Digital Fingerprinting and Link Analysis

A Microsoft white paper examines how digital fingerprinting and link analysis shift fraud detection from isolated events to connected, network-level intelligence.

Research Topic - Fraud Prevention Region - Global Topic - Scam Detection
gasa meet-up

On the Frontlines: Fighting AI-Powered Scams & Fraud

Experts from Microsoft, OpenAI, Google and C4ADS share how AI is shaping scams and how to fight back.

Topic - Fraud Prevention Region - Global Video Topic - Scam Detection

Telecoms on the Front Line: GASA at the Stimson Center Dialogue on Combating Scams

According to GASA’s Global State of Scams Report, telecommunications channels—voice and SMS in particular—remain a predominant “front door” for scams.

News Topic - Fraud Policy Region - North America Industry - Policy Makers