InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Malicious browser extensions will infect 722 users across Latin America since early 2025
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Malicious browser extensions will infect 722 users across Latin America since early 2025
Technology

Malicious browser extensions will infect 722 users across Latin America since early 2025

June 8, 2025 5 Min Read
Share
Malicious browser extensions will infect 722 users across Latin America since early 2025
SHARE

Since its launch in 2025, cybersecurity researchers have shed light on a new campaign targeting Brazilian users, infecting users with a chrome-based web browser and malicious extensions to Siphon user authentication data.

“Some of the phishing emails were sent from the servers of compromised companies, increasing the chances of successful attacks,” Positive Technologies Security Researcher Klimentiy Galkin said in the report. “The attacker used malicious extensions for Google Chrome, Microsoft Edge, and Brave Browser, as well as Mesh Agent and PDQ Connect agents.”

Russian cybersecurity company tracking activities under the name Operation Phantom Enigmasaid the malicious extensions have been downloaded 722 times from Brazil, Colombia, the Czech Republic, Mexico, Russia, Vietnam and others. Up to 70 unique victim companies have been identified. Several aspects of the campaign were disclosed in early April by researchers going with the alias @Johnk3r in X.

The attack starts with a phishing email disguised as an invoice that triggers a multi-stage process to deploy a browser extension. This message encourages recipients to download files from embedded links or to open malicious attachments contained within the archive.

The files reside in the batch scripts that are responsible for downloading and launching PowerShell scripts. This will perform a series of checks to determine whether it is running in a virtualized environment and whether a software called Diebold Warsaw exists.

Developed by Gas Tecnologia, Warsaw is a security plugin used to protect banking and e-commerce transactions through Brazil’s internet and mobile devices. It is noteworthy that Latin American bank Trojans like Casbaneiro incorporate similar features, as disclosed by ESET in October 2019.

The PowerShell script is designed to disable User Account Control (UAC) and configures the above batch script that starts automatically upon system restart to set up persistence, establish a connection with the remote server and wait for more commands.

See also  Commvault confirms that hackers misuse CVE-2025-3928 as zero day in an Azure violation

Here is a list of supported commands:

  • ping – send a “pon” accordingly and send a heartbeat message to the server
  • Disconnect – Stop the current scripting process on the victim’s system
  • removekl-uninstall script
  • Checaext – Check the Windows registry for the existence of malicious browser extensions and send OKEXT or NOEXT if the extension is not found
  • start_screen – Extensions Change the installforcelist policy to install the extension in your browser. This specifies a list of apps and extensions that can be installed without user interaction.

The detected extensions (identifiers nplfchpahihhiheejpjmodggckakhglee, ckkjdiimhlanonhceggkfjlmjnenpmfm, and lkpiodmpjdhhhkdhbnncigggdgdfli) have already been removed from the chrome webstore.

Other attack chains exchange initial batch scripts for the Windows installer and Inno setup installer files that are used to provide extensions. The Per Posional Technologies add-on is equipped to run malicious JavaScript code if the Active Browser tab corresponds to a web page associated with Banco do Brasil.

Specifically, it sends a user’s authentication token and a request to the attacker’s server, receives the command and either loads it to the victim (warten or schlieben_warten) and displays the load screen, or provides a malicious QR code on the bank’s web page (code_zum_lesen). The presence of German words for the command could either imply the location of the attacker or suggest that the source code has been reused from somewhere.

In what appears to be an effort to maximize the number of potential victims, it was found that unknown operators would leverage invoice-related lures to distribute installer files and deploy remote access software such as the MeshCentral agent and the PDQ Connect agent in place of malicious browser extensions.

See also  Malicious GO Module delivers Linux malware that paints disks with advanced supply chain attacks

Positive Technology said it has identified an open directory that belongs to the attacker’s auxiliary script./about.php?key=enigmacybersecurity “).

“This study highlights the use of fairly unique techniques in Latin America, such as malicious browser extensions and distribution via the Windows installer and the Inno setup installer,” says Galkin.

“The files in the attacker’s open directory show that the infected company is necessary to carefully distribute emails. However, the main focus of the attack remained on regular Brazilian users. The attacker’s goal is to steal authentication data from the victim’s bank account.”

Share This Article
Twitter Copy Link
Previous Article Is Dune awake? Server status now Is Dune awake? Server status now
Next Article mm AI Liability Insurance: Next Steps to Protect Your Business from AI Failure

Latest News

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws

Ransomware gang exploits flaws in less than simple help to target victims with double fear tor

The US Cybersecurity and Infrastructure Security Agency (CISA) revealed Thursday…

June 13, 2025
mm

AI and national security: a new battlefield

Artificial intelligence is changing the way nations protect themselves. It…

June 12, 2025
Zero-click AI vulnerability exposes Microsoft 365 Copilot data without user interaction

Zero-click AI vulnerability exposes Microsoft 365 Copilot data without user interaction

A new attack technology named Echoleak is characterized as a…

June 12, 2025
mm

Evogene and Google Cloud unveils basic models for the design of generative molecules, pioneering a new era of life science.

Evogene Ltd. has announced beginners in the class Generated AI…

June 11, 2025
Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

Wednesday Interpol announced the dismantling of over 20,000 malicious IP…

June 11, 2025

You Might Also Like

Fake AI Tools Used to Spread Malware
Technology

Fake AI tool used to spread noodle malware targeting 62,000+ via Facebook lure

4 Min Read
US charges Yemeni hackers behind Black Kingdom ransomware targeting 1,500 systems
Technology

US charges Yemeni hackers behind Black Kingdom ransomware targeting 1,500 systems

9 Min Read
US DOJ seizes four domains that support cybercrime crypto services in global operations
Technology

US DOJ seizes four domains that support cybercrime crypto services in global operations

4 Min Read
Top 10 Best Practices for Effective Data Protection
Technology

Top 10 Best Practices for Effective Data Protection

12 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?