Five Malicious Chrome Extensions Target Enterprise HR and ERP Platforms for Full Account Takeover

Five Malicious Chrome Extensions Target Enterprise HR and ERP Platforms for Full Account Takeover
Threat Research Team has identified a coordinated malware campaign involving five malicious Chrome extensions targeting enterprise HR and ERP platforms, including Workday, NetSuite, and SAP SuccessFactors.

The extensions have collectively reached over 2,300 users and employ complementary attack mechanisms to steal authentication tokens, block incident response capabilities, and enable complete account takeover through session hijacking.

Coordinated Malware Portfolio

Four extensions operate under the publisher name databycloud1104, while the fifth uses different branding (softwareaccess) but shares identical infrastructure patterns.

Access surfaces session token extraction and undisclosed network exfiltration.
Access surfaces session token extraction and undisclosed network exfiltration. (Source: Socket)

The extensions masquerade as productivity tools promising streamlined access to enterprise platforms and multi-account management.

All five request standard permissions that appear legitimate during installation, with privacy policies falsely claiming no data collection despite implementing comprehensive credential theft mechanisms.

The extensions demonstrate sophisticated development with version progression showing active maintenance.

Data By Cloud 2 (v3.3) has the most extensive distribution, with 1,000 users, and blocks 56 administrative pages, 27% more than Tool Access 11 (v1.4).

Data By Cloud 1 (v3.2) adds anti-debugging capabilities, while Software Access (v1.4) implements bidirectional cookie manipulation for direct session hijacking.

The campaign deploys three distinct attack types working in concert. Cookie exfiltration extensions extract session authentication tokens and transmit them to remote servers every 60 seconds via encrypted command-and-control channels.

The extensions implement persistent monitoring via cookie change listeners and alarms that verify the login state, ensuring that threat actors maintain current credentials even as users reauthenticate during everyday workflows.

DOM manipulation extensions block access to administrative interfaces by erasing page content and redirecting to malformed URLs.

Tool Access 11 targets 44 pages, including authentication management, security policy configuration, and session controls.

Data By Cloud 2 expands this to 56 pages by adding password changes, account deactivation, 2FA device management, and security audit log access.

The extensions use MutationObservers to monitor page content every 50 milliseconds, ensuring continuous blocking even in single-page applications.

Software Access implements the most sophisticated attack through bidirectional cookie manipulation.

The extension both exfiltrates authentication tokens and receives stolen cookies from its command-and-control server, then injects them into the browser using chrome.cookies.set() to enable direct session hijacking.

This eliminates authentication requirements, allowing threat actors to access compromised accounts without passwords while bypassing multi-factor authentication.

The extensions include identical lists of 23 security-focused Chrome extensions they monitor for presence, including EditThisCookie, Cookie-Editor, ModHeader, Redux DevTools, and SessionBox.

The chrome. The management API enumerates installed extensions and reports findings to command-and-control servers, allowing threat actors to assess whether security tools might interfere with credential theft.

Data By Cloud 1 and Software Access incorporate the DisableDevtool library to prevent code inspection through browser developer tools.

The library detects modifications to RegExp. prototype. toString (), property inspection, window size comparisons, and performance timing analysis to identify debugging attempts.

Software Access adds password field protection that prevents users from changing input types to inspect credential values, reverting any such attempts within one second.

The coordinated deployment creates a persistent account compromise that survives standard incident response procedures.

Security teams can detect unauthorized access through SIEM alerts or authentication anomalies, but every standard remediation action is blocked.

Organizations face containment failure scenarios where administrators cannot rotate credentials, deactivate accounts, remove trusted devices, or modify security policies because the extensions intercept and block these functions.

The campaign targets Workday’s sandbox environment (workdaysuv.com) explicitly, which is used for testing security configuration changes before production deployment.

By blocking security pages in the sandbox, the extensions prevent validation of password policy changes, authentication updates, or other security improvements, forcing organizations to either deploy untested changes directly to production or abandon security improvements entirely.

Infrastructure Verification#
Infrastructure verification (source: socket)

Users should immediately remove matching extensions, review authentication history for unexpected access, and perform password resets from clean systems.

Chrome sync settings must be turned off on all devices before removal to prevent reinstallation.

Security teams should implement Chrome Enterprise extension allowlists to prevent unauthorized installations and block identified command-and-control domains via web proxy or DNS filtering.

Authentication logs require auditing for simultaneous sessions from multiple IPs or geographically inconsistent access patterns.

domain shows a 404 Not Found error
domain shows a 404 Not Found error (Source: Socket)

Security teams from Socket are validated policy deployment status across endpoints, as restrictions on browser extensions can interfere with administrative configuration workflows, as outlined in browser security policy management documentation.

Indicators of Compromise

Indicator TypeValueNotes
Publisher Namedatabycloud1104Registered for four extensions
Publisher Emailadmin@databycloud.comAssociated with databycloud1104
Publisher NamesoftwareaccessRegistered for one extension
Publisher Emailsoftwareaccess0908@gmail.comAssociated with softwareaccess
Extension IDoldhjammhkghhahhhdcifmmlefibciphDataByCloud Access v1.6
Extension IDijapakghdgckgblfgjobhcfglebbkebfTool Access 11 v1.4
Extension IDmakdmacamkifdldldlelollkkjnoiedgData By Cloud 2 v3.3
Extension IDmbjjeombjeklkbndcjgmfcdhfbjngcamData By Cloud 1 v3.2
Extension IDbmodapcihjhklpogdpblefpepjolaoijSoftware Access v1.4
C2 Domainapi.databycloud.comCookie exfiltration endpoint
C2 Path/api/v1/mv3MV3 manifest version indicator
C2 Domainapi.software-access.comBidirectional C2 infrastructure
WebSocketwss://api.software-access.comReal-time communication
Target Cookie__sessionAuthentication token name
Blocked Domainworkdaysuv.comWorkday sandbox environment

The campaign maps to MITRE ATT&CK techniques T1539 (Steal Web Session Cookie), T1185 (Browser Session Hijacking), T1176.001 (Browser Extensions), T1027 (Obfuscated Files or Information), and T1562.001 (Disable or Modify Tools).

Technique IDTechnique Name
T1539Steal Web Session Cookie
T1185Browser Session Hijacking
T1176.001Browser Extensions
T1027Obfuscated Files or Information
T1562.001Disable or Modify Tools

All five extensions remain under investigation with takedown requests submitted to Google’s Chrome Web Store security team.

Similar patterns targeting other enterprise platforms should be anticipated as the threat actor maintains disposable infrastructure and complementary capabilities across multiple publisher identities.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Five Malicious Chrome Extensions Target Enterprise HR and ERP Platforms for Full Account Takeover appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading