Security researchers recently identified a concerning threat: five malicious Chrome extensions designed to impersonate legitimate HR and ERP platforms, specifically targeting tools like Workday and NetSuite. These deceptive extensions operate by harvesting authentication cookies from users' browsers while simultaneously blocking access to security and administrative pages through DOM manipulation techniques. This layered attack strategy allows threat actors to maintain persistent access while evading detection. Users managing digital assets should exercise caution when installing browser extensions and verify authenticity through official channels only.

This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 4
  • Repost
  • Share
Comment
0/400
MemecoinTradervip
· 01-16 18:09
ngl the cookie harvest meta here is peak social engineering theater... threat actors basically speedrunning the consensus manipulation playbook but make it malware. workday targets = institutional alpha farming fr fr
Reply0
RugPullSurvivorvip
· 01-16 18:02
It's the same old phishing trick again, just using a different disguise. People fall for it every day, and I really can't understand it.
View OriginalReply0
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)