Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

Bitcoin Family Splits Seed Phrase Across Four Continents After Crypto Attacks

June 8, 2025

Dubai Real Estate Hits $18.2B in Sales Amid Tokenization Push

June 8, 2025

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025

June 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025
Cybersecurity

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025

HarishBy HarishJune 8, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


Jun 08, 2025Ravie LakshmananMalware / Browser Security

Cybersecurity researchers have shed light on a new campaign targeting Brazilian users since the start of 2025 to infect users with a malicious extension for Chromium-based web browsers and siphon user authentication data.

“Some of the phishing emails were sent from the servers of compromised companies, increasing the chances of a successful attack,” Positive Technologies security researcher Klimentiy Galkin said in a report. “The attackers used a malicious extension for Google Chrome, Microsoft Edge, and Brave browsers, as well as Mesh Agent and PDQ Connect Agent.”

The Russian cybersecurity company, which is tracking the activity under the name Operation Phantom Enigma, said the malicious extension was downloaded 722 times from across Brazil, Colombia, the Czech Republic, Mexico, Russia, and Vietnam, among others. As many as 70 unique victim companies have been identified. Some aspects of the campaign were disclosed in early April by a researcher who goes by the alias @johnk3r on X.

Cybersecurity

The attack starts with phishing emails disguised as invoices that trigger a multi-stage process to deploy the browser extension. The messages encourage recipients to download a file from an embedded link or open a malicious attachment contained within an archive.

Present within the files is a batch script that’s responsible for downloading and launching a PowerShell script, which, in turn, performs a series of checks to determine if it’s running in a virtualized environment and the presence of a software named Diebold Warsaw.

Developed by GAS Tecnologia, Warsaw is a security plugin that’s used to secure banking and e-commerce transactions through the Internet and mobile devices in Brazil. It’s worth noting that Latin American banking trojans like Casbaneiro have incorporated similar features, as disclosed by ESET in October 2019.

The PowerShell script is also engineered to disable User Account Control (UAC), set up persistence by configuring the aforementioned batch script to be launched automatically upon system reboot, and establish a connection with a remote server to await further commands.

The list of supported commands is as follows –

PING – Send a heartbeat message to the server by sending “PONG” in response
DISCONNECT – Stop the current script process on the victim’s system
REMOVEKL – Uninstall the script
CHECAEXT – Check the Windows Registry for the presence of a malicious browser extension, sending OKEXT if it exists, or NOEXT, if the extension is not found
START_SCREEN – Install the extension in the browser by modifying the ExtensionInstallForcelist policy, which specifies a list of apps and extensions that can be installed without user interaction

The detected extensions (identifiers nplfchpahihleeejpjmodggckakhglee, ckkjdiimhlanonhceggkfjlmjnenpmfm, and lkpiodmpjdhhhkdhdbnncigggodgdfli) have already been removed from the Chrome Web Store.

Other attack chains swap the initial batch script for Windows Installer and Inno Setup installer files that are utilized to deliver the extensions. The add-on, per Positive Technologies, is equipped to execute malicious JavaScript code when the active browser tab corresponds to a web page associated with Banco do Brasil.

Specifically, it sends the user’s authentication token and a request to the attackers’ server to receive commands to likely display a loading screen to the victim (WARTEN or SCHLIEBEN_WARTEN) or serve a malicious QR code on the bank’s web page (CODE_ZUM_LESEN). The presence of German words for the commands could either allude to the attacker’s location or that the source code was repurposed from somewhere else.

Cybersecurity

In what appears to be an effort to maximize the number of potential victims, the unknown operators have found to leverage invoice-related lures to distribute installer files and deploy remote access software such as MeshCentral Agent or PDQ Connect Agent instead of a malicious browser extension.

Positive Technologies said it also identified an open directory belonging to the attacker’s auxiliary scripts containing links with parameters that included the EnigmaCyberSecurity identifier (“/about.php?key=EnigmaCyberSecurity”).

“The study highlights the use of rather unique techniques in Latin America, including a malicious browser extension and distribution via Windows Installer and Inno Setup installers,” Galkin said.

“Files in the attackers’ open directory indicate that infecting companies was necessary for discreetly distributing emails on their behalf. However, the main focus of the attacks remained on regular Brazilian users. The attackers’ goal is to steal authentication data from the victims’ bank accounts.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleAmerican Psycho Director Mary Harron Surprised Movie Still Relevant
Next Article Dubai Real Estate Hits $18.2B in Sales Amid Tokenization Push
Harish
  • Website
  • X (Twitter)

Related Posts

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

June 6, 2025

Empower Users and Protect Against GenAI Data Loss

June 6, 2025

Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam

June 6, 2025

Why More Security Leaders Are Selecting AEV

June 6, 2025

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack

June 6, 2025

Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Bitcoin Family Splits Seed Phrase Across Four Continents After Crypto Attacks

June 8, 2025

Dubai Real Estate Hits $18.2B in Sales Amid Tokenization Push

June 8, 2025

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025

June 8, 2025

American Psycho Director Mary Harron Surprised Movie Still Relevant

June 8, 2025
Don't Miss
Blockchain

Bitcoin Family Splits Seed Phrase Across Four Continents After Crypto Attacks

June 8, 20253 Mins Read

Didi Taihuttu, patriarch of the so-called “Bitcoin Family,” has overhauled his digital asset security setup…

Dubai Real Estate Hits $18.2B in Sales Amid Tokenization Push

June 8, 2025

Bitcoin market of 2025 driven by stablecoin regulation: Finance Redefined

June 6, 2025

How to Earn Passive Income with Peer-to-Peer Lending

June 6, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

Lawyers could face ‘severe’ penalties for fake AI-generated citations, UK court warns

June 7, 2025

Trump administration takes aim at Biden and Obama cybersecurity rules

June 7, 2025

Week in Review: Why Anthropic cut access to Windsurf

June 7, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.