Cyberhaven Extension Breach: Stolen Cookies & Session Tokens

cyberhaven chrome extension hacked

Just imagine you’re at work or home, comfortably browsing on Chrome. You’re logged into Facebook, your email, or your work dashboard. Everything feels normal. But behind the screen, a browser extension you trusted, one made by a respected cybersecurity company, is silently stealing your login information and handing it over to cybercriminals. The issue wasn’t a bug. It wasn’t a mistake. It was intentional. 

In December 2024, Cyberhaven’s popular Chrome extension fell victim to a cyberattack. Let me walk you through everything like we’re sitting face-to-face and I’m explaining it directly to you. The significance of the incident surpasses your initial perception. 

What Really Happened? 

In the final week of December 2024, a significant cybersecurity breach occurred through a Chrome extension developed by Cyberhaven, a company known for building data protection tools. This breach wasn’t just another digital mishap; it was a calculated infiltration. 

On December 24, one of Cyberhaven’s developers received what looked like an urgent email from Google. The message claimed that Cyberhaven’s extension had violated the policies of the Chrome Web Store. It was well-designed, using professional language, recognizable branding, and a call-to-action link. 

However, this link was a trap. Clicking it led the developer to a convincing but fake Google page that requested access permissions for the extension. Thinking it was legitimate, the developer unknowingly handed over control of their publishing account to cyber attackers. 

The attackers then uploaded a new version of the extension, version 24.10.4, embedded with malicious code. It was live for roughly 24 hours and automatically distributed to all users who had the extension installed. This infected version silently stole login session tokens, cookies, and user credentials. 

Cyberhaven discovered the breach on December 25 and acted immediately, replacing the malicious extension with a clean version. But by then, thousands of users had already been exposed. 

How Cyberhaven Chrome Extension Hacked A Step-by-Step Breakdown 

Let’s go deeper into how this happened. Think of it like a quiet, well-planned heist. Here’s the full playbook, whispered step-by-step. 

Step 1: The Phishing Hook 
It began with a single email that was designed to deceive the recipient. It was crafted to look like it came from Google, complete with a warning that Cyberhaven’s Chrome extension was in violation of web store policies. It asked the developer to fix the issue by clicking a link. This step used urgency and authority to push swift action. 

Step 2: The Fake Login Page 
The link led to a replica of Google’s sign-in and permissions page. From the fonts to the layout, everything looked legit. The attacker asked for broad publishing permissions on this page. Believing it was real, the developer granted access, handing full control of the extension to the attacker. 

Step 3: Infiltration and Update 
With access in hand, the attacker logged into Cyberhaven’s dashboard for the Chrome Web Store and uploaded a tainted update, version 24.10.4. This version looked like a normal patch, but it contained hidden JavaScript code designed to capture and transmit users’ data. 

Step 4: Silent Rollout 
Due to Chrome’s auto-update feature, every user who had the Cyberhaven extension installed received this infected version without any notification. The extension continued to work normally, so no red flags were raised. 

Step 5: Discovery and Response 
Cyberhaven detected the breach the following day. They removed the malicious version and issued a clean update, version 24.10.5. But during those crucial hours, the malicious extension had already done its damage. 

Who Was Responsible? 

While no one officially stepped forward to claim the attack, investigators quickly pieced together clues pointing to a professional, organized cybercrime group. 

The same methods compromised more than 30 different Chrome extensions. That’s not a coincidence; it’s a pattern. The infrastructure used to steal and collect data, the style of malicious code, and even the server configurations were all similar. The evidence clearly indicated that a single group of threat actors was responsible for the entire campaign. 

Experts believe the group operated from Eastern Europe, where several major cyber gangs have been known to run data theft and financial fraud operations. These attackers didn’t act randomly. They monetized stolen Facebook session tokens by launching scam ad campaigns and sold other stolen credentials on the dark web. 

This wasn’t just an attempt to break in; it was a structured and large-scale campaign aimed at making money through fraud, identity theft, and unauthorized access to cloud systems and bank accounts. Cyberhaven’s breach was just one node in a bigger, far-reaching web of attacks. 

Consequences and the Real-World Impact 

The implications of this breach go far beyond the technical side. It had real, painful effects on both users and businesses. 

Some companies saw thousands of dollars drained from their ad accounts overnight. One small business reported a $20,000 loss in just a few hours. Developers at multiple startups had to spend days over the holidays resetting passwords, revoking API keys, and conducting full security audits. 

But the financial toll is only part of the story. 

The reputation damage was severe. Cyberhaven, once trusted for protection, became a cautionary tale. People began to doubt the trustworthiness of any browser extension, particularly those that offered security. 

The attack also captured the attention of the media, privacy watchdogs, and cybersecurity forums. Questions arose: How did Google fail to detect such a critical breach in time? Should browser extensions be allowed to auto-update without checks? How secure are developer accounts and extension publishing rights? 

Beyond individual harm, this incident highlighted a wider weakness in our digital ecosystem. Cybercrime isn’t just about stealing data; it’s about destabilizing trust in the systems we rely on every day. 

How People Got Affected & How to Spot It 

What made this attack so dangerous was its invisibility. Most users had no idea anything had happened. 

The malicious version of the extension silently collected session tokens. That means hackers could log into Facebook, Gmail, or business dashboards using stolen session data—no passwords needed. 

Here are some ways to detect if you were affected:

  • Browser Extension Update Logs: Check if Cyberhaven updated around December 24. 
  • Account Activity: Look for suspicious logins on platforms like Facebook, Google, or business tools. 
  • Ad Account Activity: Review your marketing platforms for unauthorized campaigns. 
  • Security Alerts: Watch for notifications about new logins or access requests. 
  • Use Developer Tools: Chrome has tools to track extension version history and permissions. 

If something looks off:

  • Log out of all sessions on sensitive accounts. 
  • Please reset your passwords at your earliest convenience. 
  • Clear browser cookies and cached data. 
  • Scan your system using trusted antivirus and anti-malware tools. 

How to Stay Safe: Real Protection Tips 

If you want to avoid being caught in the next attack, follow these practical steps. They’re easy, effective, and could save you from serious trouble. 

Smart Safety Practices:

  1. Delete extensions you don’t use
  2. Limit permissions; only install extensions that request the least amount of access necessary. 
  3. Avoid clicking urgent-looking emails
  4. Manually monitor extension updates, especially ones that haven’t changed in a while. 
  5. Use modern security software like antivirus and anti-malware programs that cover browser-based risks. 
  6. Clear cookies often to reduce session hijacking risks. 
  7. Enable 2FA using app-based or physical security keys, not SMS. 
  8. Be suspicious of urgency. If a message pressures you, pause before clicking. 

If you’re a developer:

  • Secure publishing accounts with multi-factor authentication. 
  • Use hardware keys like YubiKey. 
  • Regularly audit your code and account access. 

Lessons We Must Learn 

This incident exposes several harsh realities. 

We often assume our tools are secure, especially ones built by security firms. However, as demonstrated, even reliable software can be compromised. One phishing email was all it took to set off a large-scale breach. 

We’ve also learned that browser auto-updates, while convenient, can be exploited. The same feature that keeps tools fresh can also deliver malicious updates without a user’s knowledge. 

Session tokens need to be treated like passwords. Once stolen, they offer silent, passwordless access to sensitive data. 

Summary of Key Lessons:

  • Never blindly trust browser extensions. 
  • Audit what extensions can do. 
  • Phishing is still the #1 threat vector. 
  • Protect your tokens, not just passwords. 
  • Chrome’s security still has critical gaps. 

Advice for Everyone Online:

  • Double-check permissions. 
  • Please educate your team on the workings of phishing. 
  • Regularly audit and clean your digital tools. 
  • Stay up-to-date on cyberthreats. 

Cybersecurity isn’t just about having reliable software, it’s about smart planning and staying aware. If you want to stay safe, don’t wait. Let’s work together. Check your browser. Secure your accounts. Ask questions. And most importantly, stay alert. 
Your safety in this digital world begins with the things and people you trust to safeguard it. 

Did you find this article helpful? Or want to know more about our Cybersecurity Products Services?
Explore our main services >> 
Mobile Security
Endpoint Security
Deep and Dark Web Monitoring
ISO Certification and AI-Management System
Web Application Security Testing
Penetration Testing
For more services go to our homepage

Follow us on X (Twitter)LinkedIn for more Cyber Security news and updates. Stay connected on YouTubeFacebook and Instagram as well. At Hoplon Infosec, we’re committed to securing your digital world.

Share this post :
Picture of Hoplon Infosec
Hoplon Infosec