Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Chrome Extensions Leak Data And API Keys

June 6, 2025
Reading Time: 2 mins read
in Alerts
Chrome Extensions Leak Data And API Keys

Cybersecurity researchers have flagged several popular Google Chrome extensions that transmit sensitive user data using unencrypted plain HTTP connections. These widely used extensions unintentionally expose Browse domains, unique machine IDs, operating system details, usage analytics, and even uninstall information. This complete lack of encryption makes them highly susceptible to adversary-in-the-middle attacks, allowing bad actors to intercept data. Malicious actors on public Wi-Fi could even modify this data in transit, which could lead to far more serious consequences. Affected extensions include SEMRush Rank, Browsec VPN, MSN New Tab, and even the DualSafe Password Manager, which erodes overall user trust.

Symantec’s security response team also identified another significant set of extensions that contain various hard-coded secrets directly within their JavaScript code.

These various embedded secrets include numerous different API keys and other sensitive tokens that an attacker could potentially weaponize for their own benefit. For example, popular extensions like AVG Online Security and SellerSprite were found to expose a hard-coded Google Analytics 4 API secret. Another extension, Equatio, embeds a Microsoft Azure API key that is used for its speech recognition features, which could be abused. Even extensions from Microsoft and popular wallets like Trust Wallet were unfortunately found to expose various API keys in their code.

Attackers who manage to find these hard-coded keys could then easily weaponize them to rapidly drive up API costs for the developers.

They could also potentially host various forms of illegal content using the compromised keys or send spoofed telemetry data to corrupt analytics. In some cases, the abuse of these keys could even see the legitimate developer’s account getting banned from essential third-party services. Adding to this significant concern, the Antidote Connector extension is just one of over ninety extensions that use the vulnerable InboxSDK library. This unfortunately means that many other browser extensions are also susceptible to exactly the same hard-coded credential exposure security problem.

These important research findings clearly show how very popular extensions with huge user bases can suffer from trivial misconfigurations and blunders. Researchers strongly recommend that all developers should immediately switch to HTTPS whenever they are sending or receiving any sensitive user data. They should also securely store their valuable credentials in a backend server and also regularly rotate all their secrets to minimize further risks. Users of these identified extensions should seriously consider removing them from their browsers until the developers address these insecure HTTP calls. A large install base or a well-known brand does not necessarily guarantee best security practices are in use by the developer.

Reference:

  • Popular Chrome Extensions Leak User Data And Expose Hardcoded API Keys
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJune 2025
ADVERTISEMENT

Related Posts

Fake Firms Push Malware on Crypto Users

Fake Sites Push Investment Scams

July 11, 2025
Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

July 11, 2025
Fake Firms Push Malware on Crypto Users

Fake Firms Push Malware on Crypto Users

July 11, 2025
Hackers Revive SEO Poisoning

Hackers Revive SEO Poisoning

July 10, 2025
Hackers Revive SEO Poisoning

RondoDox Botnet Exploits Router Flaws

July 10, 2025
Hackers Revive SEO Poisoning

ServiceNow Data Exposure via ACLs

July 10, 2025

Latest Alerts

Fake Sites Push Investment Scams

Fake Firms Push Malware on Crypto Users

Severe WordPress Flaw 200K Sites at Risk

RondoDox Botnet Exploits Router Flaws

ServiceNow Data Exposure via ACLs

Hackers Revive SEO Poisoning

Subscribe to our newsletter

    Latest Incidents

    Microsoft’s Outlook Long Outage

    Avantic Lab Affected By Ransomware

    $40M+ Stolen from GMX Crypto Platform

    Bitcoin Depot Breach Exposes Data

    McDonald’s AI Hiring Bot Exposes Data

    Nippon Steel Solutions Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial