Thank you for your interest in Obsidian! Please enter your information in the form and we will contact you shortly to schedule a demo.
On December 24, 2024, a phishing attack compromised a Cyberhaven employee’s access to the Google Chrome Web Store. The attacker used this access to upload a malicious version of Cyberhaven’s Chrome extension (version 24.10.4).
This incident was part of a larger campaign targeting Chrome Extension Developers, primarily aimed at exploiting people with access to Facebook Ads accounts. The malicious extension was distributed to a segment of Cyberhaven’s customers, prompting an ongoing investigation in collaboration with a third-party security response team.
The attacker sent a phishing email to Cyberhaven’s publicly listed support email. When the employee clicked the link, they were redirected to a legitimate Google authorization flow for a malicious OAuth application named “Privacy Policy Extension.” Despite multi-factor authentication (MFA) and Google Advanced Protection being enabled, the attacker successfully gained access.
Image by Cyberhaven via https://www.cyberhaven.com/engineering-blog/cyberhavens-preliminary-analysis-of-the-recent-malicious-chrome-extension
The attacker uploaded a malicious version of Cyberhaven’s Chrome extension. The extension passed the Chrome Web Store’s security review and replaced the legitimate version. The malicious extension was a modified copy of the clean version, embedding additional code to execute malicious activities, which went undetected by Chrome.
The malicious extension included two files:
If a user logged into Facebook.com, the malicious extension extracted:
This data was then packaged and sent to the C&C server for exploitation.
The malicious script monitored mouse clicks on Facebook.com to detect QR codes, potentially aiding attackers in bypassing CAPTCHA or MFA.
While this specific attack was aimed at gaining access to Google Web Store and Facebook Ads accounts respectively, the same vector can be used to access other types of accounts as well, namely SaaS applications that are known to be highly interconnected and contain an organization’s most sensitive data, especially within core apps like Salesforce, Microsoft 365, Snowflake, and more.
This attack on Cyberhaven demonstrates the sophistication of modern cyber attacks against identities, bypassing several security protection layers:
To effectively defend against such attacks, security teams should:
Proper tooling is essential to streamline these processes, enabling automated discovery, monitoring, and risk assessment of both OAuth applications and browser extensions, ensuring the organization stays ahead of emerging threats.
Threat actors are evolving their tried-and-true techniques and traditional defenses alone aren’t able to protect against these sophisticated attacks. The Cyberhaven incident serves as a stark reminder of the evolving threats in the digital landscape. The lessons learned from this attack should motivate all organizations to reassess their security frameworks and prioritize holistic risk mitigation strategies to prevent similar breaches in the future.
The Obsidian Platform uses a wide range of advanced discovery mechanisms to inventory all federated and unfederated applications, OAuth connections, and browser extensions, giving security teams complete observability into their SaaS environment. To learn more about how Obsidian Security can help reduce SaaS risk and prevent identity threats like this one, download our solution overview here.