Last updated 1 month ago
Google's Chrome Web Store experienced a supply chain attack affecting users of two extensions originally developed by BuildMelon (akshayanuonline@gmail.com). The extensions turned malicious after an ownership transfer, enabling attackers to push malware to downstream customers, inject arbitrary code, and harvest sensitive data from affected systems. The attack vector exploited the Chrome extension ecosystem's trust model, compromising users who had installed the legitimate extensions before the malicious update.
The attack chain began with the transfer of extension ownership to malicious actors, who then updated the extensions with malicious code. The compromised extensions gained capabilities for arbitrary code injection and data exfiltration, affecting all users who installed or updated the extensions. The attack demonstrates how supply chain compromises in browser extension marketplaces can bypass traditional security controls and affect large user populations through trusted distribution channels.
Google removed the malicious extensions from the Chrome Web Store following discovery, but users who had already installed the extensions remained vulnerable until manual removal. The incident highlights the security challenges in browser extension ecosystems where ownership transfers can introduce malicious actors into previously trusted software distribution chains.
Malicious Chrome extensions enabled code injection and data harvesting after ownership transfer
This breach demonstrates critical failures in browser extension marketplace security controls, particularly around ownership transfer validation and post-transfer monitoring. Organizations must implement enhanced vetting for extension ownership changes and continuous behavioral analysis of extension updates, as the trust placed in previously legitimate extensions created a widespread attack vector. The incident shows that supply chain attacks can originate from within official distribution channels, requiring security teams to monitor not just initial installation but all subsequent updates of browser extensions.
Sign in to join the discussion.
Company
Industry
Location
Disclosed
Records Affected
Attack Vector