A cyber espionage campaign is using 108 malicious Google Chrome extensions to steal user data and hijack web sessions through a shared Command and Control (C2) infrastructure. This centralized approach allows attackers to efficiently scale their operations, posing significant risks to both individual users and enterprise environments by bypassing multi-factor authentication and enabling unauthorized access to secure accounts.
Read the full article at Cyber Security News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



