Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)using in Google Chrome. The basis for this attack were malicious extensions that the attacker dropped on the compromised system.
The research can be found here:
More Stories
EFF joins Dozens of Organizations Urging More Government Transparency
Interoperability Gains Support at House Hearing on Big Tech Competition
Virginia’s Weak Privacy Bill Is Just What Big Tech Wants