New ‘Browser Syncjacking’ Attack Uses Chrome Extensions for Full Device Takeover

by | Jan 31, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Security researchers at SquareX have discovered a new stealthy attack method, called ‘Browser Syncjacking’, which exploits Google Chrome’s sync feature and managed profiles to gain full control over a victim’s browser and operating system.

The attack requires minimal permissions and user interaction, making it a highly effective and hard-to-detect method for browser hijacking.

How Browser Syncjacking Works

The attack involves three main phases:

  • Google Profile Hijacking
  • Browser Hijacking
  • Device Takeover

Unlike traditional malware or phishing attacks, Syncjacking relies on a seemingly benign Chrome extension that tricks the user into syncing their browser profile with a malicious Google Workspace account controlled by the attacker.

Once completed, the attacker gains full access to the victim’s browsing history, saved passwords, cookies, and authentication tokens, and can execute arbitrary commands on their system.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Step-by-Step Breakdown of the Attack

1. Creating a Malicious Google Workspace

  • The attacker creates a Google Workspace with multiple user profiles where security features such as multi-factor authentication (MFA) are disabled.
  • This Google Workspace is used in the background to enroll the victim’s browser into a managed enterprise profile.

Victim opting to sync their browsing profileVictim opting to sync their browsing profile
Source: SquareX

2. Distributing a Malicious Chrome Extension

  • The attacker uploads a legitimate-looking Chrome extension to the Chrome Web Store, designed to appear like a useful productivity tool.
  • Using social engineering, the victim is tricked into installing the extension.

At this point, no immediate signs of malicious activity occur, keeping the attack stealthy.


3. Forcing the User to Enable Chrome Sync

  • The malicious extension quietly logs the victim into the attacker’s managed Google Workspace profile in a hidden browser window.
  • The extension then opens a legitimate Google support page but injects content into it, instructing the user to enable Chrome Sync.

Why This Matters?
Once the victim syncs their browser, all their saved passwords, cookies, bookmarks, history, and authentication tokens become accessible to the attacker.

Enrolling the victim in a managed Google workspaceEnrolling the victim in a managed Google workspace
Source: SquareX


4. Browser Takeover via Fake Updates

  • Now that the attacker controls the victim’s browser, they deliver a fake software update, such as a Zoom update prompt.
  • If the victim downloads and runs the fake update, it enrolls the device into the attacker’s managed Google Workspace, giving them full control over the system.Prompting the victim to install a fake Zoom updatePrompting the victim to install a fake Zoom update
    Source: SquareX

What Can the Attacker Do at This Stage?

  • Silently access all web applications (Gmail, Drive, banking sites, etc.)
  • Install additional malicious extensions
  • Redirect the user to phishing sites
  • Monitor or modify file downloads
  • Browse directories and modify system files
  • Install malware and execute arbitrary commands
  • Capture keystrokes (keylogging)
  • Stealthily access the victim’s webcam and microphone

Accessing the victim's Drive contentsAccessing the victim’s Drive contents
Source: SquareX




Why This Attack is So Dangerous

  • Requires minimal permissions – The extension does not need high-privilege permissions, making it harder to detect.
  • No antivirus detection – Since the attack relies on legitimate Chrome features, traditional antivirus solutions may not flag it as malicious.
  • Difficult to detect – The victim is unlikely to notice that their browser has been compromised, unless they actively check Chrome’s settings for managed browser indicators.

“Unless the victim is extremely security paranoid and technically savvy, there is no real visual indication that a browser has been hijacked.” — SquareX

Mitigation Strategies: How to Protect Yourself

  • Never install unknown Chrome extensions, even if they appear useful or highly rated.
  • Check if your Chrome browser is managed by going to:
    • chrome://management → If your browser is managed by an unknown organization, remove the profile immediately.
  • Disable Chrome Sync unless absolutely necessary.
  • Manually review Chrome extensions in chrome://extensions and remove any suspicious ones.
  • Avoid downloading software updates from pop-ups or redirected pages—always update directly from the official website.
  • Enable multi-factor authentication (MFA) for Google accounts to prevent unauthorized logins.


Google’s Response

  • BleepingComputer has reached out to Google for comment, and we will update this story if a response is received.
  • Given the stealthy and dangerous nature of Syncjacking, it’s likely Google will implement new security measures to detect and prevent managed profile abuse in Chrome.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This