Advertisement · 728 × 90
#
Hashtag
#extension
Advertisement · 728 × 90
Post image

New tool for all those #Stealer #malware analysts out there:
https://crxray[.]info
Translate #Chrome #Extension IDs to their Names and Descriptions in Bulk.
Currently 174,534 Extensions in database. More related tools to come.

3 0 0 0
MultiSearch Tag Explorer MultiSearch Tag Explorer - Explore tags and search results by aéPiot - aéPiot: Independent SEMANTIC Web 4.0 Infrastructure (Est. 2009). High-density Functional Semantic Connectivity with 100/100 Trust...

#BOULOIRE
advanced-search.aepiot.ro/advanced-sea...
#WAGIN #DUMBLEYUNG #RAILWAY #EXTENSION #ACT 1911
semantic-search.allgraph.ro/advanced-sea...
aepiot.com

0 0 0 0
Post image

Explore the intersection of history, agriculture, and liberation with Jarvis McInnis wfpc.sanford.duke.edu/podcasts/lib...
#JarvisMcInnis #TuskegeeInstitute #BookerTWashington #GeorgeWashingtonCarver #experimentplot #slavegardenplot #postemancipation #extension #agriculturalknowledge #antiwasteethos

0 0 0 0
Preview
Google just killed a Chrome extension I used every day — this one replaced it Chrome extensions can be so useful, but there's one I used daily that has disappeared. Thankfully, I have already found a workaround.

" #Google just killed a #Chrome #extension I used every day — this one replaced it"

www.makeuseof.com/google-kille...

0 0 0 0
Preview
GlassWorm hides inside developer tools. Once it’s in, it steals data, installs remote access malware, and even a fake browser extension to monitor activity. While it starts with developers, the impact can quickly spread. With stolen credentials, access tokens, and compromised tools, attackers can launch wider supply chain attacks, putting companies and everyday users at risk. **How the infection starts** GlassWorm is usually distributed through developer channels. That means that programmers get their systems compromised by downloading malicious packages from code repositories like npm, GitHub, PyPI, and so on. These can be new malicious packages or altered packages from once-trusted, but now compromised, accounts. The developer installs or updates a trusted or popular npm/PyPI package or VS Code extension, but the maintainer’s account or supply chain has been compromised. **What happens after installation** Once the package is pulled, a preinstall script or invisible Unicode loader runs and fingerprints the machine. If it finds a Russian locale, execution stops. If not, the script waits a few hours and then quietly contacts the Solana blockchain to discover where to fetch stage two of the infection. Rather than hardcoding a link that could be taken down, the attacker stores this information in the memo field of a Solana transaction. **Stage two: Data theft** The stage two payload is an infostealer that targets browser extension profiles, standalone wallet apps, and .txt/image files likely holding seeds or keys, along with npm tokens, git credentials, VS Code secrets, and cloud provider credentials. After gathering this information, it sends it to a remote server via a POST request. **Stage three: Full system compromise** After that, it’s on to stage three. The malware fetches two main components: the Ledger/Trezor phishing binary aimed at users with a Ledger or Trezor device plugged in, and a Node.js Remote Access Trojan (RAT) with several modules, including browser credential stealers and a Chrome‑extension installer. It gains persistence by setting up scheduled tasks and Run registry keys so that the RAT comes back on every reboot. **How the malware stays hidden and connected** The RAT does not hardcode its main command and control (C2) address. Instead, it performs a distributed hash table (DHT) lookup for the pinned public key. DHT is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT and can be used to retrieve the value associated with a given key. If this method fails, the RAT goes back to the Solana blockchain to fetch a new IP address. **Browser surveillance and tracking** The RAT also force-installs a Chrome extension (in the example described by Aikido, it pretends to be “Google Docs Offline”), which acts as an onboard session surveillance. Besides stealing cookies, localStorage, the full Document Object Model (DOM) tree of the active tab, bookmarks, screenshots, keystrokes, clipboard content, up to 5,000 browser history entries, and the installed extensions list, it can also be used to take screenshots and act as a keylogger. **What this looks like to the victim** From the victim’s point of view, all this happens very stealthily. If they’re paying close attention, they may see a few suspicious outgoing connections, the startup entries, and the new browser extension. **Who’s at risk, and how this could spread** The current setup appears to focus on developers who may have cryptocurrency assets, but many of these components and the stolen information can be used to initiate supply chain attacks or target other groups of users. ## How to stay safe Because of the stealthy nature of this infection chain, there are two main strategies to stay safe: * Prefer known‑good, pinned versions, and treat sudden ownership changes, new maintainers, or big code rewrites in minor releases as review triggers. * Regularly audit browser extensions, remove anything you don’t recognize, and be suspicious of “Google Docs Offline”‑style clones or duplicates. * Check your scheduled tasks and registry startup locations for unexpected entries. * Use an up-to-date, real-time anti-malware solution to detect and block malicious connections and the downloaded malware. ## IOCs (Indicators of Compromise) **IP addresses:** `45.32.150[.]251` `217.69.3[.]152` `217.69.0[.]159` `45.150.34[.]158` Malwarebytes blocks the IP address 45.32.150.251 used for stage 2 payload delivery, and the stage three WebSocket RAT **Registry keys:** `HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\UpdateApp ` `HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\UpdateLedger` **Scheduled Task:** Name: `UpdateApp which runs: AghzgY.ps1` **Browser extension:** Display name: Google Docs Offline (version 1.95.1) Windows extension directory name :`jucku` macOS extension directory name: `myextension` * * * **We don’t just report on threats—we remove them** Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

GlassWorm attack installs fake browser extension for surveillance It hides inside developer tools, then monitors activity and steals data, turning a single infection into a wider risk across the su...

#News #Threat #Intel #browser #extension #developers

Origin | Interest | Match

2 0 0 0
Florida hoping to ink Golden to third extension Florida is aiming to sign coach Todd Golden to a third contract extension in as many years, while heading off potential interest from schools with open head coaching jobs.See What…

Florida hoping to ink Golden to third extension

#NCAA #Third #Golden #Florida #Extension

0 0 0 0
Preview
GitHub - Huachao/vscode-restclient: REST Client Extension for Visual Studio Code REST Client Extension for Visual Studio Code. Contribute to Huachao/vscode-restclient development by creating an account on GitHub.

Will someone take over maintaining github.com/Huachao/v... ?
Seems very dead right now. :/

#vscode #extension #rest #http

0 0 0 0
Preview
Test – Super Mario Bros. Wonder – Nintendo Switch 2 Edition + Meetup in Bellabel Park - Le Bêta-Testeur Trois ans après avoir redonné ses lettres de noblesse au jeu de plateforme en 2D, Super Mario Bros. Wonder revient sur la nouvelle console de Nintendo Voici une édition qui promet davantage qu’un simple lifting visuel mais qui s’inscrit aussi dans une stratégie de rééditions qui commence sérieusement à montrer des signes d’essoufflement.ContenuTrois ans après […]

Trois ans après avoir redonné ses lettres de noblesse au jeu de plateforme en 2D, Super Mario Bros.


#Analyse #Avis #BellabelPark #Critique #DLC #Extension #Nintendo #NintendoSwitch2 #Review
www.lebetatesteur.ca/test-super-mario-bros-wo...

0 1 0 0
Florida hoping to ink Golden to third extension Florida is aiming to sign coach Todd Golden to a third contract extension in as many years, while heading off potential interest from schools with open head coaching jobs.See What…

Florida hoping to ink Golden to third extension

#NCAA #Third #Golden #Florida #Extension

0 0 0 0

Un petit contrat de transition pour Svechkov.

Ce n'est pas bête, car il n'a pas encore éclot!

#NHL #Smashville #extension

0 0 0 0
Post image

These 6 browser extensions are winning the war against invasive websites Decide what you see, and how you see it, with the flick of a switch. The web began by empowering users, serving us with stat...

#Web #chrome #extension #Firefox #opera #Microsoft #Edge

Origin | Interest | Match

1 0 0 0
Post image

Considering a career in #extension? Our upcoming #webinar offers an understanding of the opportunities, demands, and rewards associated with careers in Extension from Dr. Edward Sikora.

Learn how programs are built and sustained on April 9: https://bit.ly/4leYYys

#planthealth

0 0 0 0
Preview
MalExt Sentry : cet outil vérifie si vos extensions Chrome sont malveillantes MalExt Sentry détecte les extensions Chrome malveillantes encore installées sur votre navigateur. Un outil open source simple pour vérifier votre sécurité.

🧩 MalExt Sentry : cet outil vérifie si vos extensions Chrome sont malveillantes

👉 www.justgeek.fr/malext-sentr...

#MalExtSentry #Extension #Chrome #OpenSource #Sécurité #Cybersécurité

4 0 0 0
Video

Tired of LinkedIn copy-pasting? 🚀

Postsiva lets you curate & repost content in one click! Keep formatting & media intact with our native browser extension.

💡 Tip: Refresh LinkedIn after install!

🎁 Comment "Postsiva" for 1 month FREE!

Team: @Postsiva
postsiva.com
#extension #Postsiva

1 0 0 0
Preview
Homebuilding & Renovating Show Description

We're at the NEC at the National Homebuilding and Renovating Show today-Sunday. Come along and talk to us about heat pumps, ventilation, hot water and room heating for your building project!

FREE TICKETS here: https://loom.ly/21i3QGM

#heatumps #hbr #renovation #sefbuild #extension #homerenovations

0 0 0 0
Preview
How to Add Signature to PDF in Microsoft Edge Browser? Add digital signature in Microsoft Edge with KAiZEN eSign. Sign PDFs, contracts, and agreements online with a secure and easy eSignature solution.

Printing. Signing. Scanning. Uploading. ❌

There’s a faster way.
Sign documents directly in #MicrosoftEdge with KAiZEN eSign.

⚡ Quick
🔒 Secure
📄 Paperless

Read more: bit.ly/4sil71j

#KAiZENeSign #eSignature #Extension #Edge

0 0 0 0
Post image

Alertan de que esta extensión de Google Chrome tiene malware: elimínala cuanto antes #Chrome #extension #Google #malware ino.to/APRNZKY

0 0 0 0