Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Hidden Leak Undercuts “Miracle” Electronics Insulator Discovery

    January 28, 2026

    Robot Lip-Sync Breakthrough: Machine Learns Realistic Speech Movement from YouTube

    January 28, 2026

    New Malicious Chrome Extensions Steal Enterprise HR Credentials and Enable Full Account Takeovers

    January 27, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    • Get In Touch
    Facebook X (Twitter) LinkedIn
    TallwireTallwire
    • Tech

      Robot Lip-Sync Breakthrough: Machine Learns Realistic Speech Movement from YouTube

      January 28, 2026

      Hidden Leak Undercuts “Miracle” Electronics Insulator Discovery

      January 28, 2026

      New Malicious Chrome Extensions Steal Enterprise HR Credentials and Enable Full Account Takeovers

      January 27, 2026

      Patent Data Reveals U.S. Tech Growth Shifting to Batteries and Sustainable Materials

      January 27, 2026

      Meta’s Metaverse Retreat Signals VR Era Is Fading

      January 27, 2026
    • AI News

      Robot Lip-Sync Breakthrough: Machine Learns Realistic Speech Movement from YouTube

      January 28, 2026

      Adobe Rolls Out New AI-Powered Video Editing Tools in Premiere and After Effects

      January 27, 2026

      Patent Data Reveals U.S. Tech Growth Shifting to Batteries and Sustainable Materials

      January 27, 2026

      Google Temporarily Disables YouTube’s Advanced Captions, Triggering Backlash

      January 27, 2026

      Meta’s Metaverse Retreat Signals VR Era Is Fading

      January 27, 2026
    • Security

      New Malicious Chrome Extensions Steal Enterprise HR Credentials and Enable Full Account Takeovers

      January 27, 2026

      Chinese AI Leaders Warn US Lead Is Widening in Tech Race

      January 25, 2026

      Emergency Windows 11 Shutdown Bug Prompts Microsoft To Release Urgent Fix

      January 25, 2026

      Pentagon Integrates Elon Musk’s Grok AI Into U.S. Military Systems Amid Innovation Push

      January 25, 2026

      Starlink Becomes Critical Internet Lifeline Amid Iran Protest Crackdown

      January 25, 2026
    • Health

      Biotics AI Secures FDA Clearance for AI-Driven Fetal Ultrasound Tool

      January 27, 2026

      Israeli Defense Corps Unveils AI-Driven PTSD Tools and Blood-Delivering Drones

      January 26, 2026

      New AI Model Flags Hidden Risks in Drinking Water Disinfection

      January 24, 2026

      Anthropic Launches Claude for Healthcare to Rival OpenAI’s ChatGPT Health

      January 20, 2026

      Goldman Sachs Says Young Workers Better Poised for Tech-Era Changes

      January 18, 2026
    • Science

      Robot Lip-Sync Breakthrough: Machine Learns Realistic Speech Movement from YouTube

      January 28, 2026

      Hidden Leak Undercuts “Miracle” Electronics Insulator Discovery

      January 28, 2026

      Biotics AI Secures FDA Clearance for AI-Driven Fetal Ultrasound Tool

      January 27, 2026

      Israeli Defense Corps Unveils AI-Driven PTSD Tools and Blood-Delivering Drones

      January 26, 2026

      New AI Model Flags Hidden Risks in Drinking Water Disinfection

      January 24, 2026
    • People

      Starlink Becomes Critical Internet Lifeline Amid Iran Protest Crackdown

      January 25, 2026

      Musk Pledges to Open-Source X’s Recommendation Algorithm, Promising Transparency

      January 21, 2026

      Meta Taps Former Trump National Security Advisor Dina Powell McCormick as New President, Vice Chair

      January 19, 2026

      Big Tech Scores a Win as Europe Softens Digital Rule Overhaul

      January 18, 2026

      Google’s John Mueller Tells Marketers to Prioritize Real Audience Data Over SEO vs. GEO Buzz

      January 17, 2026
    TallwireTallwire
    Home»Cybersecurity»New Malicious Chrome Extensions Steal Enterprise HR Credentials and Enable Full Account Takeovers
    Cybersecurity

    New Malicious Chrome Extensions Steal Enterprise HR Credentials and Enable Full Account Takeovers

    4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Google Rolls Out Emergency Patch for Major Chrome Zero-Day Exploit
    Google Rolls Out Emergency Patch for Major Chrome Zero-Day Exploit
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Security researchers have uncovered a coordinated campaign of malicious Google Chrome browser extensions that were publicly available in the Chrome Web Store and disguised as legitimate productivity or security tools. These extensions specifically targeted widely used enterprise human resources (HR) and enterprise resource planning (ERP) platforms such as Workday, NetSuite, and SAP SuccessFactors, tricking users into installing them and then quietly stealing authentication credentials and session tokens. Once installed, the extensions performed a range of harmful actions including siphoning cookies tied to login sessions to remote attackers, blocking access to administrative security pages so legitimate incident response is obstructed, and even injecting stolen authentication tokens back into browsers to facilitate account hijack without needing usernames, passwords, or multi-factor codes. The campaign affected over 2,300 installations before removal, and though the malicious add-ons were taken down from the official Chrome Web Store, risks remain if users installed them through third-party sources. Security experts warn that this incident underscores persistent weaknesses in browser extension vetting and enterprise endpoint security practices.

    Sources:

    https://www.bleepingcomputer.com/news/security/credential-stealing-chrome-extensions-target-enterprise-hr-platforms/
    https://www.scworld.com/news/workday-netsuite-and-successfactors-sessions-targeted-by-malicious-chrome-extensions
    https://www.thehackernews.com/2026/01/five-malicious-chrome-extensions.html

    Key Takeaways

    • A suite of five malicious Chrome extensions masqueraded as helpful enterprise tools to steal HR/ERP platform credentials and session cookies.
    • These extensions could block security admin pages and facilitate full session hijacking, bypassing even multi-factor authentication.
    • The operation highlights ongoing enforcement and extension-vetting gaps in browser extension ecosystems that threat actors exploit.

    In-Depth

    In the latest sign that threat actors are finding new ways to exploit trusted software layers, cybersecurity researchers have disclosed a coordinated campaign of malicious Chrome extensions that targeted enterprise human resources (HR) and enterprise resource planning (ERP) systems. These extensions, which were publicly available through Google’s Chrome Web Store, posed as productivity enhancers and security tools to users of enterprise applications such as Workday, NetSuite, and SAP SuccessFactors. Once installed, they quietly conducted credential theft and session hijacking operations that could give attackers unfettered access to corporate systems.

    Researchers first identified the malicious extensions through analysis conducted by Socket’s Threat Research Team and others, noting that although the extensions appeared to offer value-added services for HR and ERP users, they in fact contained code engineered to steal authentication cookies, interfere with security processes, and hand over control of authenticated sessions to remote attackers. These session cookies — the tokens that allow authenticated access — were exfiltrated to attacker-controlled infrastructure on a frequent, automated cadence, permitting attackers to maintain control even if a user logged out or attempted to reauthenticate. Moreover, some of the extensions were found to block access to key administrative pages within affected platforms, effectively shut-ting out legitimate security teams from their own systems during an incident.

    The extensions disguised themselves under various names and developer identities, making them difficult to detect with superficial scrutiny. Collectively they garnered more than 2,300 installs before Google removed them from the Web Store, but the threat persists: malicious extension code often remains in circulation on third-party download sites or through offline distribution. Enterprises that rely on SaaS platforms such as Workday or NetSuite for mission-critical HR and financial functions face a heightened risk when their employees install browser extensions that have broad permissions.

    This incident is a stark reminder that browser extensions, despite their utility, are an inherently risky attack surface. Many enterprises treat browser extensions as benign components of everyday workflows, but these plugins run with the same privileges as the browser itself and can access sensitive data across domains when granted the necessary permissions. This attack chain — starting with social engineering and ending in enterprise account takeover — illustrates the ease with which browser trust can be abused and why strict governance, user education, and technical controls are necessary.

    Enterprise security teams should be conducting rigorous inventories of permitted extensions, enforcing policies that restrict installation to vetted add-ons, and applying endpoint protection measures that can detect anomalous extension activities. For users, the lesson is equally sobering: just because an extension is available from an official store does not guarantee that it is safe — threat actors have repeatedly found ways to bypass vetting mechanisms. Companies should consider deploying hardened browser environments with extension whitelisting and integrate multi-factor authentication and continuous session monitoring as essential parts of their cybersecurity posture.

    The broader implications are clear: as cloud adoption grows and more corporate access happens through web browsers, attackers will continue to evolve their tactics to exploit the browser as a trusted platform. Organizations must adapt by strengthening extension governance and reinforcing endpoint security practices to mitigate these evolving threats.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAdobe Rolls Out New AI-Powered Video Editing Tools in Premiere and After Effects
    Next Article Robot Lip-Sync Breakthrough: Machine Learns Realistic Speech Movement from YouTube

    Related Posts

    Robot Lip-Sync Breakthrough: Machine Learns Realistic Speech Movement from YouTube

    January 28, 2026

    Hidden Leak Undercuts “Miracle” Electronics Insulator Discovery

    January 28, 2026

    Adobe Rolls Out New AI-Powered Video Editing Tools in Premiere and After Effects

    January 27, 2026

    Patent Data Reveals U.S. Tech Growth Shifting to Batteries and Sustainable Materials

    January 27, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Robot Lip-Sync Breakthrough: Machine Learns Realistic Speech Movement from YouTube

    January 28, 2026

    Hidden Leak Undercuts “Miracle” Electronics Insulator Discovery

    January 28, 2026

    New Malicious Chrome Extensions Steal Enterprise HR Credentials and Enable Full Account Takeovers

    January 27, 2026

    Patent Data Reveals U.S. Tech Growth Shifting to Batteries and Sustainable Materials

    January 27, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) LinkedIn Threads Instagram RSS
    • Tech
    • Entertainment
    • Business
    • Government
    • Academia
    • Transportation
    • Legal
    • Press Kit
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.