{"id":1593,"date":"2025-01-31T17:18:44","date_gmt":"2025-02-01T00:18:44","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=1593"},"modified":"2025-01-31T17:18:48","modified_gmt":"2025-02-01T00:18:48","slug":"browser-syncjacking","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2025\/01\/31\/browser-syncjacking\/","title":{"rendered":"Browser Syncjacking"},"content":{"rendered":"\n<p>Browser Syncjacking is an exploit that takes advantage of the google sync functionality of the chrome web browser to hijack a user&#8217;s browser. Google sync is used to sync a google account across multiple devices to ensure that what ever you do persist from one device to the next. Malicious actors have found a way to use this to takeover a target&#8217;s device.<\/p>\n\n\n\n<p>This method was discovered on Jan 23rd, 2025 by security researchers at SquareX[1], and as they explain it, the process involves three steps; profile hijacking, browser hijacking, and finally device hijacking.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Profile Hijacking<\/h4>\n\n\n\n<p>First the attacker buys a domain and links it to a Google workspace account. The attacker can then disable any security settings such as MFA. This allows the attacker access to a list of users that are tied to his domain on the google workspace account. The next step is to create the extension (with basic read and write permission) and get people to install it on chrome. This can be done in a myriad of ways, from social engineering through emails or just a legitimate ad campaign on YouTube or other social media platforms. Note the extension may actually provide a service, like monitoring stocks or finding coupons for amazon; the malicious part can be an add on.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"827\" height=\"466\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/bp-1.png\" alt=\"Browser Profile Hijacking image by SquareX\" class=\"wp-image-1591 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/bp-1.png 827w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/bp-1-300x169.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/bp-1-768x433.png 768w\" data-sizes=\"(max-width: 827px) 100vw, 827px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 827px; --smush-placeholder-aspect-ratio: 827\/466;\" \/><figcaption class=\"wp-element-caption\">Browser Profile Hijacking image\nby SquareX<\/figcaption><\/figure>\n\n\n\n<p>Once the extension has been installed, it will open a hidden window where it will authenticate a user profile that was created on the attacker&#8217;s Google workspace account. It will then change to that profile which will automatically bring the user to the <strong>official<\/strong> support.google.com page where google will ask the user to turn on chrome sync. If the user turn on google sync then all of their local data including browsing history passwords extensions and so on gets mapped to the profile that was logged in and connected to the attackers google workspace. All the attacker has to do is log into the same profile.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"826\" height=\"464\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/google-sync.png\" alt=\"Google sync image by SquareX\" class=\"wp-image-1586 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/google-sync.png 826w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/google-sync-300x169.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/google-sync-768x431.png 768w\" data-sizes=\"(max-width: 826px) 100vw, 826px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 826px; --smush-placeholder-aspect-ratio: 826\/464;\" \/><figcaption class=\"wp-element-caption\">Google sync image\nby SquareX<\/figcaption><\/figure>\n\n\n\n<p>It is important to note that at this point the user is already fully compromised. The only alarm here would be the profile icon changing, but with some reconnaissance and social engineering the attacker can customize this. This is made easier when the target is enterprise related as those usually use the default icon.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"828\" height=\"460\" data-id=\"1588\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/token.png\" alt=\"enrollment token\" class=\"wp-image-1588 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/token.png 828w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/token-300x167.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/token-768x427.png 768w\" data-sizes=\"(max-width: 828px) 100vw, 828px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 828px; --smush-placeholder-aspect-ratio: 828\/460;\" \/><figcaption class=\"wp-element-caption\">enrollment token image<br>by SquareX<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"829\" height=\"461\" data-id=\"1592\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/code.png\" alt=\"Registry entries image by SquareX\" class=\"wp-image-1592 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/code.png 829w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/code-300x167.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/code-768x427.png 768w\" data-sizes=\"(max-width: 829px) 100vw, 829px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 829px; --smush-placeholder-aspect-ratio: 829\/461;\" \/><figcaption class=\"wp-element-caption\">Registry entries code image<br>by SquareX<\/figcaption><\/figure>\n<\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Browser and Device Hijacking<\/h4>\n\n\n\n<p>The next step is taking over the user&#8217;s entire Chrome browser and making it a &#8220;managed&#8221; browser under the attacker&#8217;s google workspace. This is done by creating enrollment tokens using the attackers google workspace account which is then packaged into and executable along with two registry entries; the first registry entry is to make the Chrome browser &#8220;managed&#8221;, and the second registry entry is to allow &#8220;Native Messaging&#8221; through a specific extension ID. In this case the executable is made to look very similar to the official Zoom installer, we can imagine that with more information this can be customized for the target and made to look like a different app that the user is more likely to &#8220;install&#8221; or &#8220;update&#8221;.<\/p>\n\n\n\n<p>Using the zoom example, the next time the user receives a zoom link, the extension redresses the UI to make it appear that the victim&#8217;s Zoom requires an update. Again because this is on the<br>official Zoom page with an https connection, and no certificate error, the user is more likely to click on the update button which will download and execute this file the attacker has packaged.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"826\" height=\"464\" data-id=\"1590\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/zoom-update.png\" alt=\"Zoom update image by SquareX\" class=\"wp-image-1590 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/zoom-update.png 826w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/zoom-update-300x169.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/zoom-update-768x431.png 768w\" data-sizes=\"(max-width: 826px) 100vw, 826px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 826px; --smush-placeholder-aspect-ratio: 826\/464;\" \/><figcaption class=\"wp-element-caption\">Zoom update image<br>by SquareX<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"827\" height=\"466\" data-id=\"1589\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/zoom-download.png\" alt=\"Zoom download image by SquareX\" class=\"wp-image-1589 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/zoom-download.png 827w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/zoom-download-300x169.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/zoom-download-768x433.png 768w\" data-sizes=\"(max-width: 827px) 100vw, 827px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 827px; --smush-placeholder-aspect-ratio: 827\/466;\" \/><figcaption class=\"wp-element-caption\">Zoom download image<br>by SquareX<\/figcaption><\/figure>\n<\/figure>\n\n\n\n<p>when the executable runs the two registry entries one to make the browser managed and the second one to enable Native Messaging are both added to the users local machine. Now the Chrome browser restarts and when it launches it automatically picks up the enrollment token making the browser a &#8220;managed&#8221; browser with the attacker in control. The key thing here is that after this, the browser interface remains exactly the same, there are no visual changes to the user&#8217;s browser and the zoom page resets back to the original page where the user can launch the meeting as expected. This is important because as far as the user is concerned, Zoom was just updated and that is all that happened.<\/p>\n\n\n\n<p>On the attackers end, now that they have a managed browser, they can turn of safe browsing, apply a bunch of different attributes and policies but most importantly, they can <strong>enforce<\/strong> additional malicious extensions that do not have to be screened by the webstore. These extension can do anything the attacker can envision. An example of this would be using a hidden window to silently authenticate a user into a third-party application that asks for full Google Drive read and write access. They can redirect websites, like instead of the official google docs website, you are redirected to a clone of it where they have access to all data that the user inputs.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"827\" height=\"461\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/safe-browsing.png\" alt=\"Safe browsing image by SquareX\" class=\"wp-image-1587 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/safe-browsing.png 827w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/safe-browsing-300x167.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/safe-browsing-768x428.png 768w\" data-sizes=\"(max-width: 827px) 100vw, 827px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 827px; --smush-placeholder-aspect-ratio: 827\/461;\" \/><figcaption class=\"wp-element-caption\">Safe browsing image\nby SquareX<\/figcaption><\/figure>\n\n\n\n<p>The final part is the Native Messaging registry that was enabled. This allows the attacker to to basically run any commands on the users machine through the extension while the responses are sent to the attacker over a websocket connection and the extension. This allows the attacker to directly access local directory files, edit them, modify them, add new files as well. All of this happens in an extremely stealthy manner and we can easily imagine something like this going on inside an enterprise machine for months before anyone notices.<\/p>\n\n\n\n<p>The scariest part about Browser Syncjacking is just how little the user knows of what is happening. Every part of this has been tailored so well that it is hard to believe anyone would be able to notice. Gone are the days of the scary popups that are trying to download malware on your device.<\/p>\n\n\n\n<p>[1] https:\/\/labs.sqrx.com\/browser-syncjacking-cc602ea0cbd0<\/p>\n\n\n\n<p>[2] https:\/\/www.bleepingcomputer.com\/news\/security\/new-syncjacking-attack-hijacks-devices-using-chrome-extensions\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Browser Syncjacking is an exploit that takes advantage of the google sync functionality of the chrome web browser to hijack a user&#8217;s browser. Google sync is used to sync a google account across multiple devices to ensure that what ever you do persist from one device to the next. Malicious actors have found a way &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2025\/01\/31\/browser-syncjacking\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Browser Syncjacking&#8221;<\/span><\/a><\/p>\n","protected":false},"author":681,"featured_media":1585,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1593","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"featured_image_src":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/google-banner-600x400.png","featured_image_src_square":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/01\/google-banner-600x600.png","author_info":{"display_name":"Abdul Salawu","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/abdul-salawu\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/681"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=1593"}],"version-history":[{"count":1,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1593\/revisions"}],"predecessor-version":[{"id":1594,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1593\/revisions\/1594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media\/1585"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=1593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=1593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=1593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}