Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Why investing in a growing AI startup is risky and more complicated

Humanity appoints national security experts to governing trusts

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Popular Chrome Extensions leak API keys, user data over HTTP, and hardcoded credentials
Identity

Popular Chrome Extensions leak API keys, user data over HTTP, and hardcoded credentials

userBy userJune 5, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 5th, 2025Ravi LakshmananBrowser Security/Online Safety

Cybersecurity researchers have flagged several popular Google Chrome extensions known to send data over HTTP and send hardcode secrets in code, putting users at privacy and security risks.

“Several widely used extensions […] Yuanjing Guo, a security researcher with Symantec’s Security Technology and Response Team, unintentionally transmits communicable data over simple HTTP.

The fact that network traffic is not encrypted means they are susceptible to intermediate (AITM) attacks, allowing malicious actors on the same network, such as public Wi-Fi, to intercept and, worse still, to modify this data.

Cybersecurity

A list of identified extensions can be found below –

semrush rank (extension ID: idbhoeaiokcojcgappfigpifhpkjgmab) and pi rank (id: ccgdboldgdlngcgfdolahmiilojmfndl).[.]com “over plain http browsec vpn (id:omghfjlpggmjaagoclmmobgdodcjboh). Use http to call the uninstall URL for “browsec-uninstall.s3-website.eu-central-1.amazonaws” in “browsec-uninstall.s3-website.eu-central-1.amazonaws”[.]com “If a user attempts to uninstall the extension MSN new tab (ID: LKLFBKDIGIHJAAEAMNCIBECHHGALLDGL) and the MSN homepage, Bing Search & News (ID: MidiombanaceofJhodpdibeppmnamfcj), submit a unique machine identifier and other details[.]com “Dualsafe Password Manager & Digital Vault (ID: LGBJHDKJMPGJGGCBCDLHKOKKPJMEDGC).[.]com “Along with information about extensions, user browser language, and usage “type”

“While the credentials and passwords don’t appear to be leaked, the fact that the password manager uses unencrypted requests for telemetry erodes trust with an overall security attitude,” Guo said.

Symantec also identified another extension using API keys, secrets and tokens embedded directly in JavaScript code.

Online Security and Privacy Extension (ID: gomekmidlodglbbbmalcneegieAcbdmki), AVG Online Security (ID: nbmoafcmbajniiapeidgficgifbfmjfo), Speed ​​Dial [FVD] – New tab page, 3D, Sync (ID: llaficoajainaijghjlofdfmbjpebpa), and sellerspritite -amazon Research Tool (id: lnbmbgonenhhdojdielgnmeflbnfb), sellersprite -amazon Research (id: lnbmbgenenhhdojdielgnmeflbnfb). metric

equitio – Mathematics has been created digitally (ID: HJNGOLEFDPDNOOAMGDLKJGMDCMCJNC).

Amazing Screen Recorder & Screenshots (ID: nlipoenfbbikpbjkfpfilcgkoblgpmj) and Scroll Scroll Screenshot Tool and Screen Capture (ID: MFPIAEHGJBBFEDNOOIHADALHEHEHEHABHCJO).

Microsoft Editor – Spelling & Grammar Checker (ID: GPAIOBKFHNONEDKHHFJPMHDALGEOEBFA).

It includes an antidote connector (ID: LMBOPDIIKKAMFHGCCKCKCJHOJNOKGFEO) that incorporates a third-party library called InboxSDK that contains hard-coded credentials, including Api Keys.

watch2gether (id:cimpffimgeipdhnhjohpbehjkcdpjolg) expose tenor gif search API key

The Trust Wallet (ID:egjidjbpglichdcondbcbdnbeeppgdph) exposes wallet developers an API key associated with the RAMP network, a web3 platform that allows users to buy and sell Crypto directly from the app.

TravelArrow – Virtual Travel Agent (ID: COPLMFNPHAHPCKNBCHEHDIKBDIEONN), “Geolocation API key is published when creating a query to IP-API[.]com “

Attackers who end up finding these keys can equip them with weapons to reduce API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency trading orders.

In addition to concerns, the Antidote Connector is just one of over 90 extensions that use the InboxSDK. This means that other extensions are more susceptible to the same problem. The names of other extensions have not been disclosed by Symantec.

Cybersecurity

“From Ga4 Analytics secrets to Azure Speech Keys and AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can put an entire service at risk,” says Guo. “Solution: Do not store client-side sensitive credentials.”

Developers recommend switching to HTTPS every time they send or receive data, and using Credential Management Services to securely store credentials on the backend server, rotating secrets regularly to further minimize risk.

The findings show how even popular extensions with hundreds of thousands of installations suffer from minor misunderstandings and security failures like hardcoded credentials, putting user data at risk.

“Users of these extensions should consider removing them until the developer deals with their worries. [HTTP] “The company said,” the risk is not theoretical. Unencrypted traffic is easy to capture and data can be used for profiling, phishing, or other target attacks. ”

“The comprehensive lesson is that large install bases or well-known brands don’t necessarily guarantee best practices regarding encryption. You need to scrutinize your extensions for the protocols and shared data you use to ensure that your information remains truly secure.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleReddit sues mankind to train AI model Claude without permission by cutting down user data
Next Article Anduril raises $2.5 billion at a valuation of $3.05 billion led by the Founders Fund
user
  • Website

Related Posts

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025

Empower users and protect against Genai data loss

June 6, 2025

Microsoft will help CBI to dismantle the Indian call centre behind Japan’s technical assistance scam

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Why investing in a growing AI startup is risky and more complicated

Humanity appoints national security experts to governing trusts

The Crypto Public Listing Boom Begins: Thanks to Circle’s Blockbuster IPO

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Omada Health is now available: Virtual Care Startup joins IPO Wave, paying $150 million, $1.1 billion valuation of NASDAQ debut

Top 10 Startup and Tech Funding News – June 5, 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.