• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
malicious browser extensions infect 722 users across latin america since

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025

You are here: Home / General Cyber Security News / Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025
June 8, 2025

Cybersecurity researchers have shed light on a new campaign targeting Brazilian users since the start of 2025 to infect users with a malicious extension for Chromium-based web browsers and siphon user authentication data.

“Some of the phishing emails were sent from the servers of compromised companies, increasing the chances of a successful attack,” Positive Technologies security researcher Klimentiy Galkin said in a report. “The attackers used a malicious extension for Google Chrome, Microsoft Edge, and Brave browsers, as well as Mesh Agent and PDQ Connect Agent.”

The Russian cybersecurity company, which is tracking the activity under the name Operation Phantom Enigma, said the malicious extension was downloaded 722 times from across Brazil, Colombia, the Czech Republic, Mexico, Russia, and Vietnam, among others. As many as 70 unique victim companies have been identified. Some aspects of the campaign were disclosed in early April by a researcher who goes by the alias @johnk3r on X.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The attack starts with phishing emails disguised as invoices that trigger a multi-stage process to deploy the browser extension. The messages encourage recipients to download a file from an embedded link or open a malicious attachment contained within an archive.

Present within the files is a batch script that’s responsible for downloading and launching a PowerShell script, which, in turn, performs a series of checks to determine if it’s running in a virtualized environment and the presence of a software named Diebold Warsaw.

Developed by GAS Tecnologia, Warsaw is a security plugin that’s used to secure banking and e-commerce transactions through the Internet and mobile devices in Brazil. It’s worth noting that Latin American banking trojans like Casbaneiro have incorporated similar features, as disclosed by ESET in October 2019.

The PowerShell script is also engineered to disable User Account Control (UAC), set up persistence by configuring the aforementioned batch script to be launched automatically upon system reboot, and establish a connection with a remote server to await further commands.

The list of supported commands is as follows –

  • PING – Send a heartbeat message to the server by sending “PONG” in response
  • DISCONNECT – Stop the current script process on the victim’s system
  • REMOVEKL – Uninstall the script
  • CHECAEXT – Check the Windows Registry for the presence of a malicious browser extension, sending OKEXT if it exists, or NOEXT, if the extension is not found
  • START_SCREEN – Install the extension in the browser by modifying the ExtensionInstallForcelist policy, which specifies a list of apps and extensions that can be installed without user interaction

The detected extensions (identifiers nplfchpahihleeejpjmodggckakhglee, ckkjdiimhlanonhceggkfjlmjnenpmfm, and lkpiodmpjdhhhkdhdbnncigggodgdfli) have already been removed from the Chrome Web Store.

Other attack chains swap the initial batch script for Windows Installer and Inno Setup installer files that are utilized to deliver the extensions. The add-on, per Positive Technologies, is equipped to execute malicious JavaScript code when the active browser tab corresponds to a web page associated with Banco do Brasil.

Specifically, it sends the user’s authentication token and a request to the attackers’ server to receive commands to likely display a loading screen to the victim (WARTEN or SCHLIEBEN_WARTEN) or serve a malicious QR code on the bank’s web page (CODE_ZUM_LESEN). The presence of German words for the commands could either allude to the attacker’s location or that the source code was repurposed from somewhere else.

Cybersecurity

In what appears to be an effort to maximize the number of potential victims, the unknown operators have found to leverage invoice-related lures to distribute installer files and deploy remote access software such as MeshCentral Agent or PDQ Connect Agent instead of a malicious browser extension.

Positive Technologies said it also identified an open directory belonging to the attacker’s auxiliary scripts containing links with parameters that included the EnigmaCyberSecurity identifier (“<victim-domain>/about.php?key=EnigmaCyberSecurity”).

“The study highlights the use of rather unique techniques in Latin America, including a malicious browser extension and distribution via Windows Installer and Inno Setup installers,” Galkin said.

“Files in the attackers’ open directory indicate that infecting companies was necessary for discreetly distributing emails on their behalf. However, the main focus of the attacks remained on regular Brazilian users. The attackers’ goal is to steal authentication data from the victims’ bank accounts.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «new atomic macos stealer campaign exploits clickfix to target apple New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users
Next Post: New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally new supply chain malware operation hits npm and pypi ecosystems,»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.