Home » The new Gmail monitoring method no longer insists on stealing accounts, but instead uses Chrome / Edge browser extensions to “carry” your messages

The new Gmail monitoring method no longer insists on stealing accounts, but instead uses Chrome / Edge browser extensions to “carry” your messages

by admin
The new Gmail monitoring method no longer insists on stealing accounts, but instead uses Chrome / Edge browser extensions to “carry” your messages

Seeing the two-stage certification and various technology factories and services, the detection mechanism for the activities of unknown locations and devices is becoming more and more perfect. It is also becoming more and more difficult to steal the monitoring method of email accounts and read related content through phishing. However, the road does not turn people (hackers) turn. Recently, an information security industry caught a malware that is still in its infancy, suspected to be developed by a North Korean-backed hacker group SharpTongue / Kimsuky, by installing browser extensions/add-ons/plug-ins that usually feel harmless , to monitor and even steal the contents of letters and files without logging into the victim’s account.

Because there is no login warning, this method makes it easier for people to “carry” sensitive information without knowing it (surprise, but my mailbox is full of spam). Continue reading The new Gmail monitoring method no longer insists on stealing accounts, but instead “carries” the content of your letter reports through a Chrome / Edge browser extension.

▲ Image source: ArsTechnica

The new Gmail monitoring method no longer insists on stealing accounts, but instead uses Chrome / Edge browser extensions to “carry” your messages

Although everyone will want to say, then I don’t want to randomly install extensions for browsers developed based on Chromium. But “this” malware is actually quite clever. Basically, this malicious program called “SHARPEXT” may be triggered by accidentally opening certain files while surfing the Internet or receiving emails.

Source: Android Police

It doesn’t make you feel anything, or rather, it just wants you and your email service provider to not notice at all – the latter can be bypassed is actually very simple, because you are already logged in normally in the browser service. Gmail and AOL mail services, currently targeted by SHARPEXT, naturally don’t care what you’re looking at when you’re viewing emails in a browser.

See also  Agricultural prices. Although less than before, they will grow by 2% in 2023. Eurostat

After installing the browser extension, SHARPEXT will also monitor your browser by replacing the browser’s setting file and additionally executing scripts. The technology involved in this is actually quite cumbersome and meticulous. When it replaces the setting file, the Chromium series browser itself has a countermeasure mechanism – it will remind the user that the developer-related settings have been turned on. to close.

Source: Volexity

However, SHARPEXT will also try to obtain information to circumvent these mechanisms, thereby making these warning windows invisible to the user. And because these mechanisms are actually quite complicated, the information security company Volexity was able to catch this way of stealing data before the hacker organization was perfected.

Experts pointed out that although “currently” SHARPEXT only locks the Windows versions of Chrome, Edge, and the Whale browser, which is also based on Chromium, as monitoring targets. And at present, it should be mainly to monitor the US, Europe and South Korea’s strategically related issues such as nuclear bomb weapon systems to steal the content of the letter and the attached files. However, you must know that they judge that SHARPEXT is still in a very early stage where there are still many bugs (they will be caught).

As for whether the hacker group will expand the scope of monitoring keywords, or turn to other browsers and other targets, although it is unknown. But at least experts think there’s no reason SHARPEXT shouldn’t include browser development on macOS or Linux. So far, in addition to being careful not to open unsolicited files or installation files, Volexity also provides a mechanism to detect SHARPEXT-related activity, and to block the destination of the returned information in the first place. For more information on SHARPEXT, please refer to Volexity’s website for detailed instructions.

See also  For those who do not want to risk bad diseases here are the 5 exams to do over 40

Further reading:

Gao Erxuan shares the behind-the-scenes story of the new song “Somebody Else” challenged underwater with the iPhone 13 Pro Max (Interview)

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy