Fraudulent Chrome Helper: Harvests Social Media Passwords
Fraudulent Chrome Helper: Harvests Social Media Passwords
A malicious Chrome extension using ChatGPT’s name is being used to steal users’ Facebook logins for malicious advertising.
MUO VIDEO OF THE DAY
SCROLL TO CONTINUE WITH CONTENT
Disclaimer: This post includes affiliate links
If you click on a link and make a purchase, I may receive a commission at no extra cost to you.
A Fake ChatGPT Extension Is Targeting Facebook Users
Facebook and Chrome users are being targeted by a malicious browser extension using the well-known name of the AI-powered chatbot ChatGPT .
On March 8, 2023, Guardio Labs researcher Nati Tal stated in a Medium blog post that “a Chrome Extension propelling quick access to fake ChatGPT functionality was found to be hijacking Facebook accounts and installing hidden account backdoors.”
In the Medium blog post , Tal also noted the use of “a malevolent silently forced Facebook app ‘backdoor’ giving the threat actors super-admin permissions.” The extension can also harvest victims’ browser cookies.
Guardio took to Twitter to warn readers of the malicious campaign.
The phony browser extension, named “Quick access to Chat GPT”, can hack high-profile Facebook accounts to create “hijacked Facebook bot accounts”. The threat actor is then “publishing more sponsored posts and other social activities on behalf of its victim’s profiles and spending business account money credits.”
It was also speculated in the blog post that, once the attacker has accessed your data, they will “probably sell it to the highest bidder as usual.”
Thousands of Facebook Accounts May Have Been Compromised
In this malicious campaign, thousands of Facebook accounts may have been successfully hijacked. In the aforementioned blog post, it was stated that there are “more than 2000 users installing this extension on a daily basis since its first appearance on 03/03/2023.”
On top of this, Tal wrote that each one of the individuals installing the add-on “gets his Facebook account stolen and probably this is not the only damage,” suggesting that other consequences may arise from the extension’s presence.
The Malicious App Has Been Removed from Chrome
Though thousands have downloaded this phony browser extension, it has now been taken down from the Google Chrome Store, preventing further attacks via Chrome-based downloads. It is not yet known exactly how many people have been affected by this campaign, but the number of installations is a definite concern.
ChatGPT’s Name Is Consistently Used by Scammers
Since ChatGPT’s rise to fame, its name has been repeatedly used by cybercriminals to gain the trust of potential victims. Whether its phony ChatGPT-related tokens, or malicious Chat GPT-branded extensions, the popularity of this AI-powered chatbot is undoubtedly being exploited by malicious actors to steal data and money.
SCROLL TO CONTINUE WITH CONTENT
Also read:
- [New] How to Use the Instagram Question Sticker, In 2024
- [Updated] In 2024, Backup Blueprint From Your Phone to Your Snap Story
- 『Windowsとスマートフォン両方で使える』初級者が作れる9分16秒動画の制作手順
- 1. Windows 11上でISOイメージファイルを起動手順: 3つの異なるアプローチ
- 完全無料でオフライン再生可能!YouTube動画【PC・iPhone・Android】見方大特集
- Access Unlimited Reading Materials with the Comprehensive Platform, Scribd
- Fake the Location to Get Around the MLB Blackouts on Samsung Galaxy A23 5G | Dr.fone
- Hassle-Free Ways to Remove FRP Lock on Nokiawith/without a PC
- How to bypass Hot 40’s lock screen pattern, PIN or password
- In 2024, EditPrime Vision
- LosslessCutを使用してファイル統合の詳細手順
- Revolutionize Your Drive: The 7 Key Improvements Needed in Apple CarPlay Technology
- Ultimate Tutorial on How to Upload DVD Footage to YouTube Platform
- Windows 10で効果的に動画を統合するためのガイド【ビデオ編集手順】
- Windows 10のスクリーン録画テクニック - オプション3つ選択肢解説
- Title: Fraudulent Chrome Helper: Harvests Social Media Passwords
- Author: Brian
- Created at : 2024-09-29 19:47:08
- Updated at : 2024-10-03 17:03:10
- Link: https://tech-savvy.techidaily.com/fraudulent-chrome-helper-harvests-social-media-passwords/
- License: This work is licensed under CC BY-NC-SA 4.0.