Home / Companies / Socket / Blog / Post Details
Content Deep Dive

5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systems

Blog post from Socket

Post Details
Company
Date Published
Author
Kush Pandya
Word Count
3,972
Language
English
Hacker News Points
-
Summary

Socket's Threat Research Team uncovered a coordinated campaign involving five malicious Chrome extensions targeting enterprise HR and ERP platforms such as Workday, NetSuite, and SuccessFactors, aimed at stealing authentication tokens and enabling account takeovers. These extensions, including four under the "databycloud1104" name and one under "softwareaccess," collectively affect over 2,300 users and employ sophisticated techniques such as cookie exfiltration, DOM manipulation, and session hijacking. The campaign involves shared infrastructure, identical security tool detection lists, and complementary functionalities that prevent standard incident response actions, thus creating a persistent security threat. Despite presenting themselves as productivity tools, the extensions execute malicious activities like credential theft and blocking security pages while falsely claiming not to collect user data. The extensions employ anti-analysis mechanisms to evade detection and maintain control over compromised accounts, with ongoing investigations and takedown requests submitted to Google's Chrome Web Store security team.