A vulnerability has been discovered in the browser that allows malicious extensions to gain unauthorized access to private data. According to reports, this vulnerability, known as [vulnerability name], could enable attackers to capture screenshots, alter browser settings, and control user accounts.

The issue was demonstrated by publishing seemingly harmless extensions on . Once installed in the browser, the extension exploits the vulnerability, turning the attack into a cross-browser attack. Natit Tal, the lab head, stated that this case highlights the conflict between convenience and security, and showcases how modern threats use covert methods.

After the developers became aware of the threat, they fixed the vulnerability on [date]. However, this is not the first time the browser has been found to have a vulnerability. Therefore, earlier this year, another issue related to the "My Process" feature was discovered, which allows you to run files on the operating system.

The primary attack method is based on the fact that certain subdomains have privileged access to browser-built private APIs. These subdomains, such as and , are also used for internal development. It was discovered that content scripts in browser extensions could inject malicious scripts into subdomains with excessive permissions, thereby gaining access to these APIs.

This access allows attackers to intercept screenshots, extract sessions to control accounts, and even alter browser settings to redirect users to controlled servers. This opens the door to man-in-the-middle attacks, where victims can be redirected to fake banking and social media sites.

This extension can be uploaded to any additional directory, including , and after obtaining the permission to execute , it can launch attacks on certain domains that have access to . Emphasize the importance of being cautious when installing extensions, especially since the official store often serves as a platform for malware.

It also pointed out that the powerful capabilities of browser extensions can be dangerous and require stricter controls to protect users. To this end, its purpose is not only to strengthen the verification process but also to require developers to undergo real identity verification to prevent the use of free email and prepaid cards for account registration.

author-gravatar

Author: Emma

An experienced news writer, focusing on in-depth reporting and analysis in the fields of economics, military, technology, and warfare. With over 20 years of rich experience in news reporting and editing, he has set foot in various global hotspots and witnessed many major events firsthand. His works have been widely acclaimed and have won numerous awards.

This post has 5 comments:

Leave a comment: