New Delhi, April 15 -- Cybersecurity researchers have uncovered a massive, coordinated campaign involving 108 Google Chrome extensions designed to steal user data, hijack Telegram sessions, and inject malicious code into web pages. The hacking operation, first reported by Hacker News, is said to have collectively amassed roughly 20,000 installs on the Chrome Web Store.
According to a report by security firm Socket, the extensions operate under five distinct publisher identities but secretly share a single command-and-control (C2) infrastructure. The researchers noted that while the extensions masquerade as legitimate tools such as Telegram sidebar clients, text translators, and slot machine games, they execute malicious scripts in the ba...
Click here to read full article from source
इस लेख के रीप्रिंट को खरीदने या इस प्रकाशन का पूरा फ़ीड प्राप्त करने के लिए, कृपया
हमे संपर्क करें.