HomeCyber SecurityFashionable Chrome Extensions Leak API Keys, Person Knowledge through HTTP and Hardcoded...

Fashionable Chrome Extensions Leak API Keys, Person Knowledge through HTTP and Hardcoded Credentials


Jun 05, 2025Ravie LakshmananBrowser Safety / On-line Security

Fashionable Chrome Extensions Leak API Keys, Person Knowledge through HTTP and Hardcoded Credentials

Cybersecurity researchers have flagged a number of standard Google Chrome extensions which were discovered to transmit knowledge in HTTP and hard-code secrets and techniques of their code, exposing customers to privateness and safety dangers.

“A number of broadly used extensions […] unintentionally transmit delicate knowledge over easy HTTP,” Yuanjing Guo, a safety researcher within the Symantec’s Safety Know-how and Response crew, stated. “By doing so, they expose searching domains, machine IDs, working system particulars, utilization analytics, and even uninstall data, in plaintext.”

The truth that the community visitors is unencrypted additionally signifies that they’re vulnerable to adversary-in-the-middle (AitM) assaults, permitting malicious actors on the identical community reminiscent of a public Wi-Fi to intercept and, even worse, modify this knowledge, which might result in way more critical penalties.

Cybersecurity

The record of recognized extensions are under –

  • SEMRush Rank (extension ID: idbhoeaiokcojcgappfigpifhpkjgmab) and PI Rank (ID: ccgdboldgdlngcgfdolahmiilojmfndl), which name the URL “rank.trellian[.]com” over plain HTTP
  • Browsec VPN (ID: omghfjlpggmjjaagoclmmobgdodcjboh), which makes use of HTTP to name an uninstall URL at “browsec-uninstall.s3-website.eu-central-1.amazonaws[.]com” when a consumer makes an attempt to uninstall the extension
  • MSN New Tab (ID: lklfbkdigihjaaeamncibechhgalldgl) and MSN Homepage, Bing Search & Information (ID: midiombanaceofjhodpdibeppmnamfcj), which transmit a singular machine identifier and different particulars over HTTP to “g.ceipmsn[.]com”
  • DualSafe Password Supervisor & Digital Vault (ID: lgbjhdkjmpgjgcbcdlhkokkckpjmedgc), which constructs an HTTP-based URL request to “stats.itopupdate[.]com” together with details about the extension model, consumer’s browser language, and utilization “kind”

“Though credentials or passwords don’t look like leaked, the truth that a password supervisor makes use of unencrypted requests for telemetry erodes belief in its total safety posture,” Guo stated.

Symantec stated it additionally recognized one other set of extensions with API keys, secrets and techniques, and tokens straight embedded within the JavaScript code, which an attacker might weaponize to craft malicious requests and perform numerous malicious actions –

  • On-line Safety & Privateness extension (ID: gomekmidlodglbbmalcneegieacbdmki), AVG On-line Safety (ID: nbmoafcmbajniiapeidgficgifbfmjfo), Pace Dial [FVD] – New Tab Web page, 3D, Sync (ID: llaficoajjainaijghjlofdfmbjpebpa), and SellerSprite – Amazon Analysis Instrument (ID: lnbmbgocenenhhhdojdielgnmeflbnfb), which expose a hard-coded Google Analytics 4 (GA4) API secret that an attacker might use to bombard the GA4 endpoint and corrupt metrics
  • Equatio – Math Made Digital (ID: hjngolefdpdnooamgdldlkjgmdcmcjnc), which embeds a Microsoft Azure API key used for speech recognition that an attacker might use to inflate the developer’s prices or exhaust their utilization limits
  • Superior Display screen Recorder & Screenshot (ID: nlipoenfbbikpbjkfpfillcgkoblgpmj) and Scrolling Screenshot Instrument & Display screen Seize (ID: mfpiaehgjbbfednooihadalhehabhcjo), which expose the developer’s Amazon Internet Providers (AWS) entry key used to add screenshots to the developer’s S3 bucket
  • Microsoft Editor – Spelling & Grammar Checker (ID: gpaiobkfhnonedkhhfjpmhdalgeoebfa), which exposes a telemetry key named “StatsApiKey” to log consumer knowledge for analytics
  • Antidote Connector (ID: lmbopdiikkamfphhgcckcjhojnokgfeo), which includes a third-party library referred to as InboxSDK that accommodates hard-coded credentials, together with API keys.
  • Watch2Gether (ID: cimpffimgeipdhnhjohpbehjkcdpjolg), which exposes a Tenor GIF search API key
  • Belief Pockets (ID: egjidjbpglichdcondbcbdnbeeppgdph), which exposes an API key related to the Ramp Community, a Web3 platform that provides pockets builders a solution to let customers purchase or promote crypto straight from the app
  • TravelArrow – Your Digital Journey Agent (ID: coplmfnphahpcknbchcehdikbdieognn), which exposes a geolocation API key when making queries to “ip-api[.]com”

Attackers who find yourself discovering these keys might weaponize them to drive up API prices, host unlawful content material, ship spoofed telemetry knowledge, and mimic cryptocurrency transaction orders, a few of which might see the developer’s ban getting banned.

Including to the priority, Antidote Connector is only one of over 90 extensions that use InboxSDK, that means the opposite extensions are vulnerable to the identical downside. The names of the opposite extensions weren’t disclosed by Symantec.

Cybersecurity

“From GA4 analytics secrets and techniques to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, every of those snippets demonstrates how a number of strains of code can jeopardize a complete service,” Guo stated. “The answer: by no means retailer delicate credentials on the shopper facet.”

Builders are really useful to change to HTTPS every time they ship or obtain knowledge, retailer credentials securely in a backend server utilizing a credentials administration service, and repeatedly rotate secrets and techniques to additional reduce threat.

The findings present how even standard extensions with tons of of 1000’s of installations can undergo from trivial misconfigurations and safety blunders like hard-coded credentials, leaving customers’ knowledge in danger.

“Customers of those extensions ought to contemplate eradicating them till the builders handle the insecure [HTTP] calls,” the corporate stated. “The chance is not only theoretical; unencrypted visitors is straightforward to seize, and the info can be utilized for profiling, phishing, or different focused assaults.”

“The overarching lesson is that a big set up base or a well known model doesn’t essentially guarantee greatest practices round encryption. Extensions needs to be scrutinized for the protocols they use and the info they share, to make sure customers’ data stays really secure.”

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments