
Google Chrome 2FA Bypass Attacks Confirmed—Millions of Users at Risk
Recently, a severe security vulnerability was discovered in the Cyberhaven Chrome extension, which has left millions of Google Chrome users vulnerable to two-factor authentication (2FA) bypass attacks. This exploit can allow attackers to steal session cookies and authenticated sessions for targeted websites.
According to reports, the malicious extension, version 24.10.4, was uploaded to the Chrome Store between Christmas Day and Boxing Day, but it was quickly removed after being detected by Cyberhaven. It is believed that only customers who were running this specific version of the extension during the affected period would have been impacted.
This attack highlights a crucial weakness in traditional 2FA methods. Two-factor authentication relies on the assumption that attackers will not be able to bypass the additional security layer. Unfortunately, this exploit shows that even with 2FA enabled, attackers can still find ways to authenticate and access your account without your knowledge or consent.
It is essential for Google Chrome users to stay vigilant and take steps to protect themselves from these types of attacks. Firstly, it is crucial to keep all software up-to-date, including browser extensions like Cyberhaven. Secondly, be wary of suspicious login pages and never enter sensitive information on a page that does not appear legitimate.
In addition, consider using alternative 2FA methods such as Google’s security keys or passkeys, which offer stronger protection against automated bots, bulk phishing attacks, and targeted attacks compared to traditional SMS-based or app-based one-time passwords.
Source: www.forbes.com