Discover the Deceptive Chrome Add-On That Hijacks Your Facebook Credentials

Discover the Deceptive Chrome Add-On That Hijacks Your Facebook Credentials

Jeffrey Lv12

Discover the Deceptive Chrome Add-On That Hijacks Your Facebook Credentials

A malicious Chrome extension using ChatGPT’s name is being used to steal users’ Facebook logins for malicious advertising.

KoolReport Pro is an advanced solution for creating data reports and dashboards in PHP. Equipped with all extended packages , KoolReport Pro is able to connect to various datasources, perform advanced data analysis, construct stunning charts and graphs and export your beautiful work to PDF, Excel, JPG or other formats. Plus, it includes powerful built-in reports such as pivot report and drill-down report which will save your time in building ones.

It will help you to write dynamic data reports easily, to construct intuitive dashboards or to build a whole business intelligence cockpit.

KoolReport Pro package goes with Full Source Code, Royal Free, ONE (1) Year Priority Support, ONE (1) Year Free Upgrade and 30-Days Money Back Guarantee.

Developer License allows Single Developer to create Unlimited Reports, deploy on Unlimited Servers and able deliver the work to Unlimited Clients.

A Fake ChatGPT Extension Is Targeting Facebook Users

Facebook and Chrome users are being targeted by a malicious browser extension using the well-known name of theAI-powered chatbot ChatGPT .

On March 8, 2023, Guardio Labs researcher Nati Tal stated in a Medium blog post that “a Chrome Extension propelling quick access to fake ChatGPT functionality was found to be hijacking Facebook accounts and installing hidden account backdoors.”

In theMedium blog post , Tal also noted the use of “a malevolent silently forced Facebook app ‘backdoor’ giving the threat actors super-admin permissions.” The extension can also harvest victims’ browser cookies.

Guardio took to Twitter to warn readers of the malicious campaign.

The phony browser extension, named “Quick access to Chat GPT”, can hack high-profile Facebook accounts to create “hijacked Facebook bot accounts”. The threat actor is then “publishing more sponsored posts and other social activities on behalf of its victim’s profiles and spending business account money credits.”

It was also speculated in the blog post that, once the attacker has accessed your data, they will “probablysell it to the highest bidder as usual.”

Thousands of Facebook Accounts May Have Been Compromised

In this malicious campaign, thousands of Facebook accounts may have been successfully hijacked. In the aforementioned blog post, it was stated that there are “more than 2000 users installing this extension on a daily basis since its first appearance on 03/03/2023.”

On top of this, Tal wrote that each one of the individuals installing the add-on “gets his Facebook account stolen and probably this is not the only damage,” suggesting that other consequences may arise from the extension’s presence.

The Malicious App Has Been Removed from Chrome

Though thousands have downloaded this phony browser extension, it has now been taken down from the Google Chrome Store, preventing further attacks via Chrome-based downloads. It is not yet known exactly how many people have been affected by this campaign, but the number of installations is a definite concern.

Kanto Player Professional

ChatGPT’s Name Is Consistently Used by Scammers

Since ChatGPT’s rise to fame, its name has been repeatedly used by cybercriminals to gain the trust of potential victims. Whether its phony ChatGPT-related tokens, or malicious Chat GPT-branded extensions, the popularity of this AI-powered chatbot is undoubtedly being exploited by malicious actors to steal data and money.

  • Title: Discover the Deceptive Chrome Add-On That Hijacks Your Facebook Credentials
  • Author: Jeffrey
  • Created at : 2024-08-16 10:13:53
  • Updated at : 2024-08-17 10:13:53
  • Link: https://tech-haven.techidaily.com/1722112995396-discover-the-deceptive-chrome-add-on-that-hijacks-your-facebook-credentials/
  • License: This work is licensed under CC BY-NC-SA 4.0.