Carnegie Mellon University

Google Chrome Extensions Vulnerabilities


WHAT HAPPENED


In late December 2024, researchers discovered more than 30 browser extensions hosted on the Google Chrome Web Store that were thought to be malicious. Of the 30+ extensions, 20 stole credentials and session cookies via injected malicious code. The maintainers of those 20 extensions had their Chrome Web Store developer credentials phished, allowing the threat actor to publish the maliciously modified extensions through Google’s infrastructure. The others enabled web tracking via a legitimate third party monetization library that, although dubious, was in compliance with Google’s policies. The 20 Malicious Credential Stealing Extensions have since been updated to known-good code, or were removed from the Chrome Web Store.


WHAT ISO HAS DONE


The ISO analyzed historical network and endpoint (EPDR a.k.a. CrowdStrike) telemetry to identify affected machines that connected to the campus network and/or were running CrowdStrike. Notifications were sent to the affected machine owners with instructions to update or remove malicious extensions, and for the user to change their Andrew account password along with any other passwords entered into the Google Chrome browser. ISO continues to monitor and notify for new connections that would indicate the use of the malicious extensions.


ISO requested that the Desktop Support Program (DSP) apply Google Chrome policies to DSP managed machines to block the malicious extensions that were withdrawn from the Chrome Web Store without being updated.


WHAT YOU SHOULD DO


  1. Foundation Services customers should implement the Google Chrome extension blocking policies per the instructions from Foundation Services. See 

Foundation Services: Blocking Tainted Browser Extensions.


  1. If not using Foundation Services, see the following references for how to implement the Google Chrome extension blocking policies:

Consult the Policy Block Implemented column of the Malicious Credential Stealing Extensions table (see below) for the five extensions that were withdrawn from the Chrome Web Store without being updated and need to be blocked.


  1. For non-domain joined machines make sure that all Google Chrome extensions are updated and/or delete any that you do not need. The following link contains instructions on locating, updating and deleting extensions:

Chrome Web Store Help - Install and manage extensions


  1. If you still have any of the specific extension name and version combinations from Malicious Credential Stealing Extensions (see below), remove them.

  1. If you think that your browser had one or more of the malicious extensions (see list below):
    • Change your Andrew account password using a different browser by visiting https://identity.andrew.cmu.edu
    • Change any other passwords entered into the Google Chrome browser
    • Inform the ISO (iso-ir@andrew.cmu.edu, 412-268-2044) so that we can determine whether any additional actions might be necessary

Any questions or comments can be directed to the Computing Services Help Center (it-help@cmu.edu).


MALICIOUS CREDENTIAL STEALING EXTENSIONS


Extension Name

ID

Version

Policy Block Implemented

VPNCity

nnpnnpemnckcfdebeekibpiijlicmpom

2.0.1

Parrot Talks

kkodiihpgodmdankclfibbiphjkfdenh

1.16.2

Uvoice

oaikpkmjciadfpddlpjjdapglcihgdle

1.0.12

Internxt VPN

dpggmcodlahmljkhlmpgpdcffdaoccni

1.1.1

Bookmark Favicon Changer

acmfnomgphggonodopogfbmkneepfgnh

4.00

Castorus

mnhffkhmpnefgklngfmlndmkimimbphc

4.40

Yes

Wayin AI

cedgndijpacnfbdggppddacngjfdkaca

0.0.11

Search Copilot AI Assistant for Chrome

bbdnohkpnbkdkmnkddobeafboooinpla

1.0.1

Yes

VidHelper - Video Downloader

egmennebgadmncfjafcemlecimkepcle

2.2.7

AI Assistant - ChatGPT and Gemini for Chrome

bibjgkidgpfbblifamdlkdlhgihmfohh

0.1.3

Yes

TinaMind - The GPT-4o-powered AI Assistant!

befflofjcniongenjmbkgkoljhgliihe

2.13.0

Bard AI chat

pkgciiiancapdlpcbppfkmeaieppikkk

1.3.7

Yes

Reader Mode

llimhhconnjiflfimocjggfjdlmlhblm

1.5.7

Primus (prev. PADO)

oeiomhmbaapihbilkfkhmlajkeegnjhe

3.18.0

Cyberhaven security extension V3

pajkjnmeojmbapicmbpliphjmcekeaac

24.10.4

GraphQL Network Inspector

ndlbedplllcgconngcnfmkadhokfaaln

2.22.6

GPT 4 Summary with OpenAI

epdjhgbipjpbbhoccdeipghoihibnfja

1.4

Yes

Vidnoz Flex - Video recorder & Video share

cplhlgabfijoiabgkigdafklbhhdkahj

1.0.161

YesCaptcha assistant

jiofmdifioeejeilfkpegipdjiopiekl

1.1.61

Proxy SwitchyOmega (V3)

hihblcmlaaademjlakdpicchbjnnnkbo

3.0.2