κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens
άμυνα
.

Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens

06/06/2025

A significant security vulnerability affecting millions of Chrome extension users has been discovered, revealing widespread exposure of sensitive API keys, secrets, and authentication tokens directly embedded in extension code.

This critical flaw stems from developers hardcoding credentials into their JavaScript files, making these secrets accessible to anyone who inspects the extension packages.

The vulnerability affects popular extensions with millions of combined users, potentially exposing cloud services, analytics platforms, and other third-party integrations to unauthorized access and abuse.

The security oversight represents one of the most fundamental mistakes in modern software development, where sensitive authentication materials are stored in plain text within client-side code.

Once Chrome extensions are published to the Web Store, their source code becomes readily available for inspection, effectively broadcasting these credentials to potential attackers.

The implications extend far beyond simple data exposure, as malicious actors can leverage these credentials to spam analytics services, incur unauthorized cloud computing costs, upload malicious content, or gain broader access to connected services depending on the permissions associated with each compromised key.

Symantec researchers identified this widespread vulnerability while conducting routine security assessments of popular browser extensions, uncovering a pattern of poor credential management practices across multiple high-profile extensions.

The discovery highlights a systemic issue in extension development practices, where convenience often supersedes security considerations.

The affected extensions collectively serve over 15 million users, making this one of the largest credential exposure incidents in recent browser extension history.

The vulnerability’s impact varies significantly depending on the type and scope of exposed credentials, ranging from corrupted analytics data to potential financial losses for extension developers whose cloud services become targets for abuse.

More concerning is the possibility that attackers could use compromised AWS credentials or similar cloud service keys to pivot into broader infrastructure, potentially accessing databases, file storage systems, or other connected resources if the credentials possess elevated permissions.

Technical Analysis of Credential Exposure Patterns

The exposed credentials follow distinct patterns across different extension categories, with analytics keys, cloud storage credentials, and speech recognition API tokens representing the most common vulnerabilities.

In the case of Avast Online Security & Privacy and AVG Online Security extensions, hardcoded Google Analytics 4 API secrets appear directly in JavaScript variables.

Code snippets showing hardcoded Google Analytics 4 (GA4) API secrets (Source – Security)

The code snippet var GA4_API_SECRET = “2y-Q”; demonstrates how these secrets are appended to analytics URLs, enabling attackers to flood GA4 endpoints with fraudulent events and corrupt metrics data.

Similarly, the Equatio – Math Made Digital extension exposes Azure API keys for speech recognition services through window.equatioAzureApiKey = “48!3”;.

This exposure allows malicious users to consume the developer’s Azure subscription resources, potentially resulting in significant unexpected costs.

Exposed AWS access key (Source – Security)

The most severe cases involve AWS access keys found in screenshot applications, where the exposed credentials AWSAccessKeyId: “AKIA” could enable attackers to upload malicious content to S3 buckets or access other AWS services if the credentials possess broader permissions.

Speed up and enrich threat investigations with Threat Intelligence Lookup! -> 50 trial search requests
Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

Our favorite third-party Windows customization tool now lets you clean your storage better

If you want to take control over Windows' features, you could do a lot worse than giving Wintoys a try. It's a cool little third-party suite of stuff you can check out, and we recently named it something everyone should be using. Source: xda-developers.com … [Read More...]

One of the best ways to evade Windows 11's system requirements now lets you control when Windows updates

Windows 10's end-of-life date is fast approaching, and in response, the apps designed to help people transition to Windows 11 are undergoing a flurry of updates to handle the expected influx of users better. Currently, two apps help users bypass Windows 11's system requirements: Rufus (which recently received a dark mode update) and Flyoobe (formerly Flyby11). Source: xda-developers.com … [Read More...]

Heidi Health raises $65M Series B led by Steve Cohen’s Point72

Dr. Tom Kelly is a trauma surgeon, and everywhere, he sees doctors drowning in administrative work. He wanted change, so he set out to build it.  “We wanted to build an AI care partner that would stand alongside clinicians and take care of the admin so that individual providers, like me, can feel empowered to deliver the care which we dedicated our lives to,” he told … [Read More...]

OnePlus 15 to Reportedly Carry the Largest Battery on a OnePlus Smartphone

OnePlus 15 launch appears to be around the corner, after the company confirmed that the smartphone will make its debut in China in October. Meanwhile, a new report claims that the OnePlus 13 successor will be backed by the largest battery ever seen on a OnePlus smartphone. Alongside, it is also expected to support wireless charging. The new details arrive just days after a tipster claimed that the … [Read More...]

3 reasons why Perplexity’s Comet has become my go-to browser

There’s no shortage of browsers nowadays, and a new one seems to pop up every few days. And though some of the browsers that launch quietly fade away and are eventually forgotten, every so often one comes along that manages to take over the internet. Source: xda-developers.com … [Read More...]

3 signs that you need a new CPU instead of a GPU

When you experience lower average frame rates or FPS drops, it's easy to assume that your graphics card is the culprit. After all, it's the main component that drives the visuals while you're gaming. However, the issue is that your GPU isn't always the primary cause of all your FPS issues. Although it does most of the heavy lifting in graphically demanding workloads, your CPU plays an equally … [Read More...]

The 3 PlayStation Plus games announced at State of Play you have to download to your PS5

PlayStation has been building up the catalog of classics and new titles available to players through the PlayStation Plus game catalog. With the September 2025 State of Play presentation, that catalog of titles for PS5 owners is continuing to get larger, offering a variety of games to play on the console. Unlike previous showings of State of Play, some highly requested and classic games are making … [Read More...]

5 productivity apps that made my NAS more useful than Google Workspace

Google Workspace is the industry default productivity suite, and rightly so — it’s fast, reliable, has excellent integrations, and offers handy collaboration features. However, it is just another subscription added to your credit card, which starts to bother you, especially if your team size is growing. Source: xda-developers.com … [Read More...]

6 tiny self-hosting tools that save me hours every week

If you are like me, you love the idea of self-hosting, but hate the thought of endless configuration and maintenance. The truth is, self-hosting doesn’t have to be a major time sink – it can actually be a massive time saver. I have spent months testing and refining my setup, and in the process, I have found tiny set-it-and-forget-it tools that work tirelessly in the background. Source: … [Read More...]

4 video game franchises that have lost their identity

Every successful game franchise has something that makes it unique: a style, a story, or a gameplay mechanic that players fall in love with. But when a series strays too far from its roots, that identity starts to fade. Here are four big franchises that lost touch with what made them special. Source: xda-developers.com … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • Our favorite third-party Windows customization tool now lets you clean your storage better
  • One of the best ways to evade Windows 11's system requirements now lets you control when Windows updates
  • Heidi Health raises $65M Series B led by Steve Cohen’s Point72
  • OnePlus 15 to Reportedly Carry the Largest Battery on a OnePlus Smartphone
  • 3 reasons why Perplexity’s Comet has become my go-to browser

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023