Thisis a public service announcement from the Wordfence team regarding a security issue that has a wide impact. During the past 3 months, eight Chrome browser extensions were compromised and the attacker used them to steal Cloudflare credentials and serve up malicious ads.
Based on total installs for these extensions, the attackers targeted a total of 4.8 million users. The developers of these Chrome extensions all had their account credentials compromised. They received an email that looked like this:
Once the attackers had access to modify the code in these Chrome extensions and release new code, they made a change that injected their own malicious Javascript into the extensions. The new code looked like this:
This allows an attacker to perform any action as the victim. This includes accessing any website the victim is signed into and modifying the content of any web page that the victim views. Once an attacker has control of one of your Chrome extensions, they own your web browser.
Once a victim installed a compromised Chrome extension, the extension would steal Cloudflare credentials if the victim has a Cloudflare account. The extension did this by making a request to a URL on Cloudflare to get an API key.
Lesson number one from this attack is that, as we have reported in the past, even those of us who are seasoned online professionals can fall victim to a phishing or spear phishing attack. Make absolutely sure that if you receive an email, you verify the origin and think before you click or download.
The NotPetya ransomware attacks we reported on recently started with an accounting firm in Ukraine, a company called M.E. Doc, having their software distribution system compromised. This allowed an attacker to distribute ransomware out to customers of M.E. Doc.
If you are a developer, it is important to be aware that as these attacks become more popular, you are more likely to be targeted because you are a gateway to infecting a much larger group of people: your customers.
Attacks targeting site owners are also a supply chain attack. You supply your large audience with content. By controlling your website and serving up a browser exploit, an attacker can take control of a large number of workstations in a single attack.
If you are a website owner, please share this public service announcement with your community to help create awareness of these kinds of supply chain attacks that target developers and website owners.
Wordfence Security includes an endpoint firewall, malware scanner, robust login security features, live traffic views, and more. Discover why over 5 million WordPress sites put their trust in Wordfence.
In other words, if I poll my employees to find out if any of them have these extensions installed, and it turns out they do, then what do I need to do other than rotate all our Cloudflare credentials if the employee(s) who had these extensions had access to our Cloudflare account?
If they have one of these installed and had it installed while it was compromised, then all bets are off. You need to do global password changes for that user along with revoking any keys that user may have and issuing new ones.
If seasoned pros are falling for this kind of phishing, what are we greenhorns supposed to do... I will have to worry about every email coming from one of my banks, service providers or online accounts... Is there any way to protect myself from all these attacks, any comprehensive security suite etc.
Cloudflare users can simply log in to their dashboard and change their API under the "My Profile" tab -- it's a one-click process. It's on the same page that they would use to change their password as well.
Back in February or early April, I noticed something odd going on with one of the sites I maintain that was using Cloudflare. I spotted the activity as I read through the list of live traffic events via the WordFence dashboard. I had recently installed WordFence on all the sites I manage after one of them was hacked.
I reported this to Cloudflare and to WordFence. CloudFlare blew me off. Wordfence did get back to me, but the tech who did, didn't seem to grasp what I was trying to show them. At any rate, the activity had not penetrated my firewall and I reluctantly moved on. If I can find the email thread from that incident, I will pass it along. This was shortly after the news reports that CloudFlare accounts had been compromised. It seemed clear to me, that there was more going on beyond what had been discovered and now I suspect that this was it. If I am correct, then this began several months sooner than is being reported.
Hi Michael. Our folks are quite responsive and all are technical. Sorry to hear you didn't get the analysis you were after. Drop us a line again in the ticketing system and I'll give the team a heads up to expect you.
That is generally a good idea, but it is possible to mask the link with javascript and make the link that appears when you hover say anything you want. I used to do this with affiliate links in so that it just shows the main domain and stripped out the affiliate details so people would follow the link.
Still amazes me how stupid these developers were not having 2fa, either yubikey or google authenticator attached to their accounts, I have been watching this unfold for 4 months now in the chrome dev forums. Our extension is just about to be released we already have yubikey and authenticator on, you need both to log in, I know of another extension that has been compromised that has 800k users. as he didn't have 2fa on hahaha , I'm not a dev but its basic common sense as far as I am concerned, secure your login stops 99% of problems. The other issue is devs have been telling me they are not getting responses form google or chromium to rectify this either, there not getting there credential reset so they can log in and remove the injected codebase, the hackers were changing ownership details of the accounts so the dev cant gain access, I hope google or chromium is on top of this now.
If I had one of those extensions but was deactivated, did I have any risks and need to change all of my passwords? I used chrome as one of my main browsers and now I'm worried. The extension has been deactivated practically since I installed it, I didn't use it but had as one of those "just in case" things.
Usually if I get an email that asks me to login to view more, I ignore the link and go to the site directly via the browser using the address that i'm familiar with. its just that extra bit of caution.
I've maintained - and happily pay for - my WordFence Premium long after I stopped using WordPress because I find your service and your blog to be important. I like being aware of the threats out there. No place does this as well as WordFence. This PSA blog on the Chrome extensions attack is an excellent example of your value. Thanks!
These Cookies allow us to collect certain information about how you navigate the Sites or utilize the Services running on your device. They help us understand which areas you use and what we can do to improve them.
These Cookies are used to deliver relevant information related to the Services to an identified machine or other device (not a named or otherwise identifiable person) which has previously been used to visit our Sites. Some of these types of Cookies on our Sites are operated by third parties with our permission and are used to identify advertising sources that are effectively driving customers to our Sites.
3a8082e126