On June 3, 2024, Twitter user @CryptoNakamao shared their experience of losing $1 million due to downloading the malicious Chrome extension Aggr, sparking concerns among the crypto community about extension risks and their own asset security. On May 31, the SlowMist Security Team released an analysis titled “Wolf in Sheep’s Clothing | Analysis of False Chrome Extensions Stealing”, detailing the malicious actions of the Aggr extension. Given the lack of background knowledge among users about browser extensions, SlowMist’s Chief Information Security Officer, 23pds, used a Q&A format in the article to explain the basics and potential risks of extensions. They also provided recommendations to mitigate extension risks, aiming to help individual users and trading platforms enhance the security of their accounts and assets.
(https://x.com/im23pds/status/1797528115897626708)
1.What are Chrome extensions?
A Chrome extension is a plugin designed for Google Chrome to extend the browser’s functionality and behavior. These extensions can customize the user’s browsing experience, add new features or content, and interact with websites. Chrome extensions are typically built using HTML, CSS, JavaScript, and other web technologies. The structure of a Chrome extension generally includes the following components:
2.What do Chrome extensions do?
The flexibility and diversity of Chrome extensions allow them to be applied to almost any browsing scenario, helping users accomplish tasks more efficiently.
3.What permissions does the Chrome extension have after it is installed?
After installation, Chrome extensions may request a series of permissions to execute specific functions. These permissions are declared in the extension’s manifest.json file and prompt users for confirmation during installation. Common permissions include:
<all_urls>
: Allows the extension to access content from all websites. This broad permission enables the extension to read and modify data on all websites.These permissions enable Chrome extensions to perform many powerful and diverse functions, but they also mean that extensions may access sensitive user data such as cookies, authentication information, and more.
4.Why can malicious Chrome extensions steal user permissions?
Malicious Chrome extensions can exploit requested permissions to steal users’ credentials and authentication information because these extensions have direct access to and can manipulate the user’s browser environment and data.
5.Why did the victims of this malicious extension have their permissions stolen and their funds compromised?
Because this malicious Aggr extension happened to obtain the background information we just discussed, here is a snippet of the permissions section from its manifest.json file:
6.What can a malicious Chrome extension do after stealing users’ cookies?
Seeing this, many users may wonder, “What should I do? Should I just disconnect from the internet and stop using it altogether? Should I use a separate computer for operations? Should I avoid logging into platforms via web pages?” There are many extreme suggestions online, but in reality, we can learn how to reasonably prevent such risks:
Personal user’s mitigation measures:
Final risk control recommendations for platforms: By implementing these measures, trading platforms can reduce the security risks posed by malicious Chrome extensions to users:
Enforce the use of Two-Factor Authentication (2FA):
Enable 2FA globally: Require all users to enable Two-Factor Authentication (2FA) for login and important operations (such as trading, placing orders, and fund withdrawals), ensuring that even if a user’s cookies are stolen, attackers cannot easily access the account.
Multiple authentication methods: Support multiple 2FA methods such as SMS, email, Google Authenticator, and hardware tokens.
Session management and security:
Device management: Provide users with the ability to view and manage logged-in devices, allowing them to log out sessions from unrecognized devices at any time.
Session timeout: Implement session timeout policies to automatically log out inactive sessions, reducing the risk of session hijacking.
IP address and geolocation monitoring: Detect and alert users to login attempts from unusual IP addresses or geolocations, and block these logins if necessary.=
Enhance account security settings:
Security notifications: Promptly notify users of important actions such as account logins, password changes, and fund withdrawals via email or SMS to alert users of suspicious activities.
Account freeze feature: Provide an option for users to quickly freeze their accounts in emergencies to control damage.
Strengthen monitoring and risk control systems:
Abnormal behavior detection: Use machine learning and big data analytics to monitor user behavior, identify abnormal trading patterns and account activities, and intervene in risk control promptly.
Risk warnings: Alert and restrict suspicious activities such as frequent changes in account information or frequent failed login attempts.
Provide security education and tools for users:
Security education: Disseminate security knowledge to users through official social media accounts, email, platform notifications, etc., raising awareness about the risks of browser extensions and how to protect their accounts.
Security tools: Provide official browser plugins or extensions to help users enhance account security, and detect and alert users to potential security threats.
To be frank, from a technical standpoint, implementing the risk control measures mentioned earlier isn’t always the best approach. Balancing security and business needs is crucial; too much emphasis on security can degrade user experience. For example, requiring second-factor authentication during order placement might lead many users to disable it for quicker transactions. This convenience for users also benefits hackers, as stolen cookies could allow them to manipulate trades and compromise user assets. Therefore, different platforms and users may require varied approaches to risk management. Finding the balance between security and business goals varies by platform, and it’s crucial that platforms prioritize both user experience and safeguarding user accounts and assets.
On June 3, 2024, Twitter user @CryptoNakamao shared their experience of losing $1 million due to downloading the malicious Chrome extension Aggr, sparking concerns among the crypto community about extension risks and their own asset security. On May 31, the SlowMist Security Team released an analysis titled “Wolf in Sheep’s Clothing | Analysis of False Chrome Extensions Stealing”, detailing the malicious actions of the Aggr extension. Given the lack of background knowledge among users about browser extensions, SlowMist’s Chief Information Security Officer, 23pds, used a Q&A format in the article to explain the basics and potential risks of extensions. They also provided recommendations to mitigate extension risks, aiming to help individual users and trading platforms enhance the security of their accounts and assets.
(https://x.com/im23pds/status/1797528115897626708)
1.What are Chrome extensions?
A Chrome extension is a plugin designed for Google Chrome to extend the browser’s functionality and behavior. These extensions can customize the user’s browsing experience, add new features or content, and interact with websites. Chrome extensions are typically built using HTML, CSS, JavaScript, and other web technologies. The structure of a Chrome extension generally includes the following components:
2.What do Chrome extensions do?
The flexibility and diversity of Chrome extensions allow them to be applied to almost any browsing scenario, helping users accomplish tasks more efficiently.
3.What permissions does the Chrome extension have after it is installed?
After installation, Chrome extensions may request a series of permissions to execute specific functions. These permissions are declared in the extension’s manifest.json file and prompt users for confirmation during installation. Common permissions include:
<all_urls>
: Allows the extension to access content from all websites. This broad permission enables the extension to read and modify data on all websites.These permissions enable Chrome extensions to perform many powerful and diverse functions, but they also mean that extensions may access sensitive user data such as cookies, authentication information, and more.
4.Why can malicious Chrome extensions steal user permissions?
Malicious Chrome extensions can exploit requested permissions to steal users’ credentials and authentication information because these extensions have direct access to and can manipulate the user’s browser environment and data.
5.Why did the victims of this malicious extension have their permissions stolen and their funds compromised?
Because this malicious Aggr extension happened to obtain the background information we just discussed, here is a snippet of the permissions section from its manifest.json file:
6.What can a malicious Chrome extension do after stealing users’ cookies?
Seeing this, many users may wonder, “What should I do? Should I just disconnect from the internet and stop using it altogether? Should I use a separate computer for operations? Should I avoid logging into platforms via web pages?” There are many extreme suggestions online, but in reality, we can learn how to reasonably prevent such risks:
Personal user’s mitigation measures:
Final risk control recommendations for platforms: By implementing these measures, trading platforms can reduce the security risks posed by malicious Chrome extensions to users:
Enforce the use of Two-Factor Authentication (2FA):
Enable 2FA globally: Require all users to enable Two-Factor Authentication (2FA) for login and important operations (such as trading, placing orders, and fund withdrawals), ensuring that even if a user’s cookies are stolen, attackers cannot easily access the account.
Multiple authentication methods: Support multiple 2FA methods such as SMS, email, Google Authenticator, and hardware tokens.
Session management and security:
Device management: Provide users with the ability to view and manage logged-in devices, allowing them to log out sessions from unrecognized devices at any time.
Session timeout: Implement session timeout policies to automatically log out inactive sessions, reducing the risk of session hijacking.
IP address and geolocation monitoring: Detect and alert users to login attempts from unusual IP addresses or geolocations, and block these logins if necessary.=
Enhance account security settings:
Security notifications: Promptly notify users of important actions such as account logins, password changes, and fund withdrawals via email or SMS to alert users of suspicious activities.
Account freeze feature: Provide an option for users to quickly freeze their accounts in emergencies to control damage.
Strengthen monitoring and risk control systems:
Abnormal behavior detection: Use machine learning and big data analytics to monitor user behavior, identify abnormal trading patterns and account activities, and intervene in risk control promptly.
Risk warnings: Alert and restrict suspicious activities such as frequent changes in account information or frequent failed login attempts.
Provide security education and tools for users:
Security education: Disseminate security knowledge to users through official social media accounts, email, platform notifications, etc., raising awareness about the risks of browser extensions and how to protect their accounts.
Security tools: Provide official browser plugins or extensions to help users enhance account security, and detect and alert users to potential security threats.
To be frank, from a technical standpoint, implementing the risk control measures mentioned earlier isn’t always the best approach. Balancing security and business needs is crucial; too much emphasis on security can degrade user experience. For example, requiring second-factor authentication during order placement might lead many users to disable it for quicker transactions. This convenience for users also benefits hackers, as stolen cookies could allow them to manipulate trades and compromise user assets. Therefore, different platforms and users may require varied approaches to risk management. Finding the balance between security and business goals varies by platform, and it’s crucial that platforms prioritize both user experience and safeguarding user accounts and assets.