top of page

Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts

  • Jan 16
  • 2 min read

Key Findings


  • Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that impersonate HR and ERP platforms like Workday, NetSuite, and SuccessFactors.

  • The extensions work together to steal authentication tokens, block incident response capabilities, and enable complete account takeover through session hijacking.

  • All five extensions have been removed from the Chrome Web Store, but are still available on third-party software download sites.

  • The extensions are advertised as productivity tools that offer access to premium tools for different platforms.


Background


  • Two of the extensions, DataByCloud 1 and DataByCloud 2, were first published on August 18, 2021.

  • The campaign, despite using two different publishers, is assessed to be a coordinated operation based on identical functionality and infrastructure patterns.


Cookie Theft and DOM Manipulation


  • DataByCloud Access requests permissions for cookies, management, scripting, storage, and declarativeNetRequest across Workday, NetSuite, and SuccessFactors domains, and collects authentication cookies for a specified domain.

  • Tool Access 11 (v1.4) prevents access to 44 administrative pages within Workday by erasing page content and redirecting to malformed URLs.

  • DataByCloud 2 expands the blocking feature to 56 pages, targeting both production environments and Workday's sandbox testing environment.


Session Hijacking


  • DataByCloud 1 replicates the cookie-stealing functionality from DataByCloud Access, while incorporating features to prevent code inspection using web browser developer tools.

  • Software Access combines cookie theft with the ability to receive stolen cookies and inject them into the browser to facilitate direct session hijacking.

  • It also comes fitted with password input field protection to prevent users from inspecting credential inputs.


Indicators of Compromise


  • All five extensions feature an identical list of 23 security-related Chrome extensions that are designed to monitor and flag their presence to the threat actor.

  • This is likely an attempt to assess whether the web browser has any tool that can possibly interfere with their cookie harvesting objectives or reveal the extension's behavior.


Sources


  • https://thehackernews.com/2026/01/five-malicious-chrome-extensions.html

  • https://www.hendryadrian.com/5-malicious-chrome-extensions-enable-session-hijacking-in-en/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page