Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Malicious YouTube Pages Targeting Chrome Users

Researchers at Zscaler have discovered a fake YouTube page that is hosting malicious Chrome extensions. Such pages, as seen in the past, prey on the uninformed users with poorly patched systems to spread malware.

Researchers at Zscaler have discovered a fake YouTube page that is hosting malicious Chrome extensions. Such pages, as seen in the past, prey on the uninformed users with poorly patched systems to spread malware.

Fake YouTube pages have been leveraged by criminals for years, and often used to spread malware under the guise of video codecs. Normally, they target Internet Explorer and Firefox users.

Zscaler’s discovery of such a page targeting Google Chrome users is new. The fact that the malicious Chrome extension is hosted on the official Google Chrome store is bold, but the attacker behind this latest scheme slaps the search giant a second time by leveraging the Google URL shortening service to propagate the attack.

“It looks like the author of this malicious extension doesn’t have a high opinion of Google’s security by using Google for hosting the extension and using their URL shortener to inject the malicious JavaScript,” Zscaler’s Julien Sobrier wrote in the company’s blog.

Assuming the victim clicks on any of the adds, or the video player itself, the fake page attempts to install a Chrome extension that claims to record YouTube videos. The extension warns the user that the permissions essentially hand over complete control, but like other warnings – the attacker is counting on the fact that this heads-up will be ignored.

Fake YouTube page Installs Malware

Once installed, the ability to access Tools or Settings in Chrome is denied, and the victim’s (when the attack was fully functional) accounts on Facebook, YouTube, Last.fm, and Twitter are spammed with additional malicious links.

The attack is somewhat disabled, but parts of it are working – including the spamming of Facebook’s Timeline. It’s possible that the other three services can be targeted down the line, as the attacker needs only to acquire additional hosting.

Zscaler has more details available on their blog. It’s likely that the malicious extension was cleared for hosting on the official store, due to the fact that it complies by offering a control warning. In June 2012, Google disabled the installation of extensions for 3rd-party sites, and silent installs were given the axe later that same year.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.