Subscription Plans

Beginner’s Bundle

$
3.00
$
$
0
  • Access to all standard articles and news updates
  • Ad-supported experience
  • Weekly newsletter with top stories
  • Bookmark articles to read later

Infinity Plan

$
7.00
$
$
0
  • Everything in the Premium Plan
  • Priority customer support
  • Monthly live Q&A sessions with our editors
  • Unlimited access to archived articles
  • Invitations to exclusive virtual events and webinars

Elevate Subscription

$
5.00
$
0
  • Everything in the Basic Plan
  • Ad-free browsing for an uninterrupted experience
  • Early access to featured articles
  • Exclusive premium content and in-depth analysis
  • Access to member-only newsletters
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Windows Defender Chrome Extension Detection

Date:

Share post:

With the recent Cyberhaven Extension(2) attack, looking for specific Chrome extensions installed can be very helpful.   If you are running Defender with enhanced vulnerability management, Defender automatically catalogs installed extensions by going to Vulnerability Management -> Inventories and selecting Browser Extension from the Defender Console.  Also, you can do Hunt Queries on the DeviceTvmBrowserExtensions table.  

For those who do not have this feature, you can still look for malicious extensions by searching for the Chrome Extension ID. This ID is used for the folder name on the computer and is easy to find. If you have other Chrome variant browsers, this query will also catch extensions in them. The query at the bottom(1) covers all the IDs listed in the article for Cyberhaven.

 

 

For this extension, the malicious version was 1.5.7 

In the example above, we can see that version 1.5.7 was installed on Dec 12th and updated to 1.6.2 on Jan 5th. 

There are several write-ups with more IOCs about this (2). The below query is a Zeek DNS query for Defender for the C&C domain. 

DeviceNetworkEvents

| where ActionType == ‘DnsConnectionInspected’

| extend json = todynamic(AdditionalFields)

| extend query = tostring(json.query)

| where query == “cyberhavenext.pro”

or query == “api.cyberhaven.pro”

|summarize by DeviceName

If you happen to have a user affected by this, they need to reset their passwords and session to anything sensitive they have accessed during that time. 

 

(1)

DeviceFileEvents

|where FolderPath contains “nnpnnpemnckcfdebeekibpiijlicmpom” or

FolderPath contains “kkodiihpgodmdankclfibbiphjkfdenh” or

FolderPath contains “oaikpkmjciadfpddlpjjdapglcihgdle” or

FolderPath contains “dpggmcodlahmljkhlmpgpdcffdaoccni” or

FolderPath contains “acmfnomgphggonodopogfbmkneepfgnh” or

FolderPath contains “mnhffkhmpnefgklngfmlndmkimimbphc” or

FolderPath contains “cedgndijpacnfbdggppddacngjfdkaca” or

FolderPath contains “bbdnohkpnbkdkmnkddobeafboooinpla” or

FolderPath contains “egmennebgadmncfjafcemlecimkepcle” or

FolderPath contains “bibjgkidgpfbblifamdlkdlhgihmfohh” or

FolderPath contains “befflofjcniongenjmbkgkoljhgliihe” or

FolderPath contains “pkgciiiancapdlpcbppfkmeaieppikkk” or

FolderPath contains “llimhhconnjiflfimocjggfjdlmlhblm” or

FolderPath contains “oeiomhmbaapihbilkfkhmlajkeegnjhe” or

FolderPath contains “ndlbedplllcgconngcnfmkadhokfaaln” or

FolderPath contains “epdjhgbipjpbbhoccdeipghoihibnfja” or

FolderPath contains “cplhlgabfijoiabgkigdafklbhhdkahj” or

FolderPath contains “jiofmdifioeejeilfkpegipdjiopiekl” or

FolderPath contains “hihblcmlaaademjlakdpicchbjnnnkbo” or

FolderPath contains “llimhhconnjiflfimocjggfjdlmlhblm” or

FolderPath contains “ekpkdmohpdnebfedjjfklhpefgpgaaji” or

FolderPath contains “epikoohpebngmakjinphfiagogjcnddm” or

FolderPath contains “miglaibdlgminlepgeifekifakochlka” or

FolderPath contains “eanofdhdfbcalhflpbdipkjjkoimeeod” or

FolderPath contains “ogbhbgkiojdollpjbhbamafmedkeockb” or

FolderPath contains “bgejafhieobnfpjlpcjjggoboebonfcg” or

FolderPath contains “igbodamhgjohafcenbcljfegbipdfjpk” or

FolderPath contains “mbindhfolmpijhodmgkloeeppmkhpmhc” or

FolderPath contains “hodiladlefdpcbemnbbcpclbmknkiaem” or

FolderPath contains “lbneaaedflankmgmfbmaplggbmjjmbae” or

FolderPath contains “eaijffijbobmnonfhilihbejadplhddo” or

FolderPath contains “hmiaoahjllhfgebflooeeefeiafpkfde”


 


(2)https://arstechnica.com/security/2025/01/dozens-of-backdoored-chrome-extensions-discovered-on-2-6-million-devices/

(3)https://secureannex.com/blog/cyberhaven-extension-compromise/

 

Tom Webb 

@tom_webb@infosec.exchange

Source link

spot_img

Related articles

File Hashes Analysis with Power BI from Data Stored in DShield SIEM

I previously used Power BI to analyze DShield sensor data and this time I wanted to show...

Raspberry Pi Pico powers $75 PicoCalc portable programming handheld

Building a Raspberry Pi project from scratch is always a satisfying experience and one of the best ways...

AI Ethics in Event Management

The rapid adoption of artificial intelligence in event management has created new opportunities and challenges for event professionals...