Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Chrome Extensions Leak Data And API Keys

June 6, 2025
Reading Time: 2 mins read
in Alerts
Chrome Extensions Leak Data And API Keys

Cybersecurity researchers have flagged several popular Google Chrome extensions that transmit sensitive user data using unencrypted plain HTTP connections. These widely used extensions unintentionally expose Browse domains, unique machine IDs, operating system details, usage analytics, and even uninstall information. This complete lack of encryption makes them highly susceptible to adversary-in-the-middle attacks, allowing bad actors to intercept data. Malicious actors on public Wi-Fi could even modify this data in transit, which could lead to far more serious consequences. Affected extensions include SEMRush Rank, Browsec VPN, MSN New Tab, and even the DualSafe Password Manager, which erodes overall user trust.

Symantec’s security response team also identified another significant set of extensions that contain various hard-coded secrets directly within their JavaScript code.

These various embedded secrets include numerous different API keys and other sensitive tokens that an attacker could potentially weaponize for their own benefit. For example, popular extensions like AVG Online Security and SellerSprite were found to expose a hard-coded Google Analytics 4 API secret. Another extension, Equatio, embeds a Microsoft Azure API key that is used for its speech recognition features, which could be abused. Even extensions from Microsoft and popular wallets like Trust Wallet were unfortunately found to expose various API keys in their code.

Attackers who manage to find these hard-coded keys could then easily weaponize them to rapidly drive up API costs for the developers.

They could also potentially host various forms of illegal content using the compromised keys or send spoofed telemetry data to corrupt analytics. In some cases, the abuse of these keys could even see the legitimate developer’s account getting banned from essential third-party services. Adding to this significant concern, the Antidote Connector extension is just one of over ninety extensions that use the vulnerable InboxSDK library. This unfortunately means that many other browser extensions are also susceptible to exactly the same hard-coded credential exposure security problem.

These important research findings clearly show how very popular extensions with huge user bases can suffer from trivial misconfigurations and blunders. Researchers strongly recommend that all developers should immediately switch to HTTPS whenever they are sending or receiving any sensitive user data. They should also securely store their valuable credentials in a backend server and also regularly rotate all their secrets to minimize further risks. Users of these identified extensions should seriously consider removing them from their browsers until the developers address these insecure HTTP calls. A large install base or a well-known brand does not necessarily guarantee best security practices are in use by the developer.

Reference:

  • Popular Chrome Extensions Leak User Data And Expose Hardcoded API Keys
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJune 2025
ADVERTISEMENT

Related Posts

Dragon Breath Deploys Roninloader Ghosts

Rondodox Targets XWiki To Grow Botnet

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Windows 10 Update Error 800f0922

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Dragon Breath Deploys Roninloader Ghosts

November 17, 2025
Imunify360 Flaw Puts Sites At Risk

Imunify360 Flaw Puts Sites At Risk

November 14, 2025
Imunify360 Flaw Puts Sites At Risk

Safery Extension Steals Crypto Wallets

November 14, 2025
Imunify360 Flaw Puts Sites At Risk

ChatGPT Flaw Exposed Core Infrastructure

November 14, 2025

Latest Alerts

Rondodox Targets XWiki To Grow Botnet

Windows 10 Update Error 800f0922

Dragon Breath Deploys Roninloader Ghosts

Imunify360 Flaw Puts Sites At Risk

Safery Extension Steals Crypto Wallets

ChatGPT Flaw Exposed Core Infrastructure

Subscribe to our newsletter

    Latest Incidents

    Logitech Confirms Major Data Breach

    Hackers Steal Maternity Ward Videos

    Checkoutcom Rejects Hackers After Breach

    Hackers Breach NY State Texting Service

    Doordash Hit By October User Data Breach

    Synnovis Reports Data Theft In Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial