Chrome Logo - 1

Chrome, which is used by many around the world, stores user info and supports a wide variety of Extensions which makes it the target for malware attacks.

Now, as per a report by Zimperium, A malicious extension that lets attackers use Google Chrome remotely.

Don’t want to miss the best from TechLatest ? Set us as a preferred source in Google Search and make sure you never miss our latest.

As per a new report, A new Chrome exploits named Cloud9 which have been using malicious extensions to steal online accounts, and keystrokes, inject ads, malicious JS Node, and join the victim browser in a DDOS attack.

The Cloud9 botnet basically a remote access trojan (RAT) for chromium-based browsers , i.e., Google Chrome & Microsoft Edge allowing the group to execute commands remotely.

Although the malicious Chrome extension isn’t on the official Chrome Store, it is being spread through other mediums like websites pushing fake Adobe Flash Player updates , which seems to be working well as it has affected users across the planet, mentions the report!

Cloud9 Malware Extension - 2

Cloud9 Malware Extension

The malicious Chrome extension consists of mining cryptocurrency using the victim resources, three Javascript for collecting information about the system and injecting scripts that run browser botnets.

The security firm noticed the loading of the exploits for the CVE-2019-11708 & CVE-2019-9810 vulnerabilities for Firefox, CVE 2014-6332 and CVE 2016-0189 for the OG Internet Explorer, and CVE-2016- for Microsoft Edge.

These exploit are used to automatically install and perform Windows malware on the victim, allowing the group to run serious system compromises.

Although even without installing the window malware component, the malicious extension, i.e., cloud9, can steal cookies from the affected browser which the group can seize the user session and take control of the accounts.

Cloud9 Stealing Cookies - 3

The browser cookie stealer (via Zimperium)

Furthermore, the exploit uses a keylogger that looks for keypresses to steal the passwords and the system that constantly scans the clipboard of the system for new passwords and other sensitive information.

Cloud9 Clipper - 4

Cloud9’s clipper component (via Zimperium)

The malware enrolls the host power to execute the layer 7 DDOS attacks through an HTTP POST request to attack the domain. With that being said, the layer 7 DDOS attacks are pretty difficult to determine, as the TCP connection looks like a valid request.

Also, the hacker can inject ads by silently loading webpages to generate ad impressions to make revenue, said Zimperium.

The group/hackers behind Cloud9 are likely a part of the Keksec group, as the C2 domain, which was used in one of its recent attacks, was seen in Keksec’s past attacks as well.

For those who don’t know, the group Keksec is one that was in control of developing and running numerous botnets like Tsunamy, DarkHTTP, Nectro, etc.!

Screenshot of Cloud9 panel (Zimperium) - 5

Screenshot of Cloud9 panel (via Zimperium)

Enjoyed this article?

If TechLatest has helped you, consider supporting us with a one-time tip on Ko-fi. Every contribution keeps our work free and independent.