Recent research by IBM Security Lab has identified an increase in campaigns deploying malicious Chrome extensions, primarily targeting financial institutions in Latin America (LATAM). This blog post will reveal the group behind these attacks, explore their web injects and Man-in-the-Browser techniques, and discuss how they use Telegram to transmit data from compromised machines. Malicious Chrome extensions are a significant threat, capable of more than mere annoyance. These sophisticated tools can gather technical information, capture screenshots, access and overwrite the browser’s clipboard, inject scripts into web pages, steal credentials and cookies, track browsing history, and redirect users to phishing sites. Their versatility allows cybercriminals to execute numerous harmful activities with minimal detection. Since 2012, the CyberCartel group has been active in Latin America and has recently emerged with a new threat. Instead of developing their own malware, they utilize Malware-as-a-Service from established malware families. Their latest variant targets Chromium-based browsers like Google Chrome, aiming at high-value entities such as government offices and financial institutions. They use sophisticated techniques to avoid detection, maintain long-term access, and inject phishing sites into legitimate sessions. Additionally, they deceive users into downloading malicious files from domains that mimic legitimate government or billing websites. The first campaign linked to the LATAM region uses a malicious Chrome extension to steal sensitive information. The Caiman malware, a banking trojan targeting LATAM, uses a similar technique, installing malicious extensions under the guise of "Chrome Notification" and redirecting victims to phishing sites impersonating banks. To protect against these threats, users should only download extensions from trusted sources, review permissions carefully, use two-factor authentication, and regularly update their browser and extensions.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...