Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Malicious Chrome Extensions Target Meta Business Suite: A Technical Timeline and Immediate Actions
Meta Description:
Analysis of a malicious Chrome extension targeting Meta Business Suite — what happened, who’s affected, key indicators of compromise, immediate mitigation steps, and enterprise controls.
Publication date: 2024-06-15
Last updated: 2024-06-15
Keywords: malicious Chrome extension, Meta Business Suite security, browser extension mitigation
TL;DR for Admins and Security Teams
- Immediate Actions:
- Audit your environment for suspicious browser extensions; check for known IOCs and extension IDs currently under investigation.
- Revoke and rotate compromised tokens, cookies, or API keys associated with Meta (Facebook/Instagram/WhatsApp) business accounts.
- Push Chrome Extension policies to block/allowlist only sanctioned extensions (see official documentation).
- Examine proxy, DNS, and endpoint logs for connections to identified malicious domains/IPs.
- Notify impacted users, including digital marketing, social media staff, and executives.
- Review all third-party extensions and workflows used with Meta Business Suite.
- Scope:
- A recently reported malicious Chrome extension targeted Meta Business Suite users, including marketers, agencies, and admins managing high-value digital assets.
- Who to Notify:
- Security Operations, IT, and Digital Marketing managers. If impacted, escalate to Meta/Facebook security and legal team for potential data exposure.
- Report incidents to your national CERT or equivalent authority.
What Happened: Incident Overview
Incident summary:
In June 2024, security researchers identified a malicious Chrome extension (originally described in open-source threat reports — see CISA AR24-151A, Google security blog, and Chrome extension removals) targeting Meta Business Suite users. The extension masqueraded as a productivity or authentication enhancement tool. Upon installation, it captured browser session data (including non-HttpOnly cookies, session tokens, and clipboard contents) and exfiltrated these artifacts to external attacker-controlled C2 domains.
Timeline:
- Discovery: Public research reports surfaced in June 2024.
- Chrome Web Store listing/takedown: Extension was delisted several days after disclosure.
- Ongoing investigation: As of publication, some IOCs remain valid; see below for technical artifacts.
Extension identifiers and domains (as available):
- Extension ID(s): Not named here for legal and attribution safety; available from vendor writeups or through CERT request.
- Domains: Exfiltration observed to domains matching
*.cl-masters[.]comand related C2 hosts; see Google TAG report for domain patterns. - Hashes, file artifacts: Available from threat intel feeds or on request from the author (see below for contact).
Why names omitted:
Direct naming is withheld here pending legal clearance and to avoid accidental defamation or spreading unverified attribution. All IOCs are sourced from public, cross-corroborated advisories.
Who's Affected
- Primary Targets:
- Meta Business Suite users (including Facebook/Instagram marketers, agency staff, and business admins).
- Secondary Risk:
- Any enterprise with teams that use browser-based access to social, ad, or CRM platforms.
- Managed service providers supporting multiple client Meta assets.
IOCs (Indicators of Compromise)
Note: For full technical IOCs (extension ID, sample POST URLs, hashes), consult CISA AR24-151A, Google blog, and your threat intelligence vendor. Certified teams can request further data via email (see author contact).
Extension/Manifest Data
- Chrome extension manifest v2/v3; request permissions for
tabs,cookies,webRequest,activeTab, and content scripts on*://business.facebook.com/*and*://*.meta.com/*. - Examples of malicious permissions:
chrome.cookies— can access cookies not flagged HttpOnly or with restrictive SameSite policies (Chromium docs).- Content scripts can scrape DOM data, including tokens rendered in non-protected fields.
- Communication with C2 via
fetch/XHR POST to attacker domain.
Network Artifacts
- Outbound traffic to C2 domains (observed pattern):
POST hxxps://api.cl-masters[.]com/sync- User-agents matching Chrome extensions.
- Base64-encoded payloads containing cookies/session tokens.
- DNS lookups to previously unknown or recently registered domains.
Evidence and How I Know This
As a consultant and incident responder since 2013 (see LinkedIn), I've analyzed extension-based malware and conducted root cause analysis for breaches across large advertising firms, public universities, and financial sector clients. My forensic workflow:
- Static analysis: Decompiled extension code to verify permission use and exfiltration paths.
- Network logs: Inspected proxy and DNS logs for connections to known C2s, and correlated with Chrome extension events.
- WHOIS/domain intel: Confirmed C2 domains registered in privacy-off or fast-flux patterns.
- Extension manifests: Compared manifest v2/v3 behaviors, noting overbroad host permissions and risky API usage (see Chrome docs).
- Incident cookbook: Example: In 2022, uncovered a "free productivity" extension in a US university using ID
abcedfghijklmno, which POSTed session cookies toattacker-backup[.]xyz; network session logs corroborated credential exfiltration. - Client privacy: Specific client details anonymized by contract; all technical examples are representative and reproducible with provided references.
How Extensions Access Browser Data
- Host Permissions: Allow access to specified webpages/domains (reference).
- Content Scripts: Can scrape page contents, detect DOM variables, and pull tokens unless they are HttpOnly or SameSite=strict (OWASP guidance).
- Cookies API: Extensions with
cookiespermission can access non-HttpOnly cookies. HttpOnly/secure cookies are restricted. - background.js/Event Page: Used for persistent exfil, connection beacons.
- Manifest Differences: Manifest v3 restricts some APIs (e.g., blocks arbitrary remote code fetch by default), but many legacy extensions remain on v2.
- References:
Immediate Mitigation Steps (0–48 Hours)
For security admins:
-
Audit and remove untrusted extensions:
- Run Chrome policy-based reports:
chrome://policyor enterprise dashboards. - Search for IOCs: Extension IDs, domains, unusual network flows.
- Remove/suspend any browser extensions with high-risk permissions (as detailed above).
- Run Chrome policy-based reports:
-
Block and allowlist extensions:
- Use Chrome Enterprise policies:
- Example
ExtensionSettingsJSON (Google documentation):{ "*": { "installation_mode": "blocked" }, "abcdefghijklmnopabcdefghijklmnop": { "installation_mode": "allowed" } }
-
Revoke and rotate credentials:
- Revoke potentially compromised session tokens, oAuth credentials, Meta API keys. Focus on long-lived tokens and service accounts.
- Use Meta’s Business Security tools and rotate as per vendor guidance.
-
Network/endpoint log review:
- Query proxy/firewall/DNS logs for outbound connections to listed C2s.
- Use endpoint EDR/XDR to search for extension-related process trees or injection events.
- SIEM (e.g., Splunk, Sentinel) query example:
index=proxylogs domain IN ("*.cl-masters.com", "api.cl-masters.com") - Alert on anomalous POST/GET requests involving session data payloads.
-
Notify and instruct users:
- Communicate clearly to all Meta Business Suite users about the risk.
- Push browser updates and require Chrome relaunch.

Short-Term Controls (Next 2 Weeks)
- Implement a browser extension whitelist using enforced policy (see links above).
- Mandate endpoint protection (EDR) coverage on all user workstations.
- Require tamper-proofing on Chrome profile settings for all privileged users.
- Review and reduce unnecessary access to Meta Business Suite for all non-essential staff.
- Set up detection for newly installed browser extensions using automated inventory.
Long-Term Controls (Policy & Architecture)
-
Zero Trust Enforcement:
- Treat all browser extensions as potential adversary code.
- Use Conditional Access Controls (Azure AD, Okta, etc.) to force re-auth and monitor risky sign-ins.
-
Extension Lifecycle Management:
- Only allow corporate-signed/approved extensions.
- Regularly review extensions for dormant permissions or legacy APIs.
-
Security Awareness:
- Train users on the risks of unsanctioned browser extensions.
- Incorporate real-world breach examples from CISA.
-
Incident Playbooks:
- Automate alerts for anomalous browser extension events.
- Regularly drill extension-driven account takeover scenarios.
Detection: What to Examine in Logs
- Proxy/Firewall Logs
- Outbound to
*.cl-masters[.]com, recent ephemeral domains, or geolocated C2 servers.
- Outbound to
- Browser Telemetry
- Unusual extension install events (
chrome.management.onInstalled).
- Unusual extension install events (
- Endpoint
- New extension files in user profiles.
- Scripted browser launches with suspicious command-line args (automation/Botkit signatures).
- Cloud App Logs
- Unexpected access to business app APIs (Meta, Google Workspace, O365) from unfamiliar IPs, browser/user agent anomalies.
- Sample Queries
- EDR:
file_create AND ext=".crx" - SIEM:
event_type:extension_install AND extension_id:"[malicious_id]"
- EDR:
Policy Enforcement Examples
- Chrome Enterprise Policy:
- Configure via Google Admin Console: How-to
- Windows GPO:
Computer Configuration > Administrative Templates > Google > Google Chrome > Extensions- Policy:
Configure extension installation blocklist
- MDM/Intune:
- Push extension settings to enrolled devices (Microsoft doc)
Correction and Attribution Policy
All technical details corroborated through public advisories and my direct incident response engagements. If corrections or new evidence emerge, I will promptly update the article, noting changes in this section. Contact details below for submission of corrections, additional IOCs, or verifiable extension IDs.
Author
Jon Harding
Principal Incident Responder & Security Architect, StratSec Consulting
11+ years in enterprise IT and security ops, hands-on breach analysis for Fortune 500, higher ed, and SMB clients. Notable: Led investigation of large-scale social engineering + extension compromise in 2022 (see LinkedIn).
Contact: jon@stratsec.io | StratSec.io
Further Reading / References
- CISA AR24-151A: Malicious Browser Extensions in 2024
- Chrome extension API documentation
- Chrome Enterprise extension policies
- Google TAG: High-Risk Chrome Extensions 2023
- OWASP Browser Extension Security Cheat Sheet
- Meta Business Security Practices
- Microsoft: Conditional Access for SaaS and Browser Apps
- Sample Chrome security update / extension takedown notices
- Chrome extension manifest v2/v3 migration guide
If you need access to specific forensic artifacts, enterprise playbooks, or wish to report additional malicious extension activity in the Meta ecosystem, contact author above or your regional CERT.