Multiple IBM Verify Identity Access Vulnerabilities
June 6, 2025DarkCrystal RAT aka DCRat – Active IOCs
June 7, 2025Multiple IBM Verify Identity Access Vulnerabilities
June 6, 2025DarkCrystal RAT aka DCRat – Active IOCs
June 7, 2025Severity
High
Analysis Summary
A critical security vulnerability has been uncovered in several widely used Chrome extensions, exposing millions of users to potential risk due to the careless inclusion of sensitive credentials, such as API keys, authentication tokens, and cloud service secrets, directly in the client-side JavaScript code. This widespread flaw stems from developers hardcoding these secrets into their extensions, making them publicly accessible to anyone inspecting the extension files via the Chrome Web Store. Once published, a Chrome extension’s source code becomes transparent, inadvertently broadcasting these sensitive credentials to malicious actors who can misuse them for unauthorized access or abuse of connected services.
The exposed credentials affect a broad range of extensions, collectively used by over 15 million users. According to researchers, these leaks are not isolated incidents but instead highlight a systemic issue in browser extension development. Developers, prioritizing functionality and rapid deployment, have neglected basic security hygiene by embedding secrets directly into their code. This misstep presents attackers with an easy opportunity to exploit cloud services, inject fraudulent analytics data, or even perform privilege escalation depending on the scope and permissions of the exposed keys. The vulnerability allows for abuse ranging from spamming analytics services to incurring significant cloud costs for developers.
Detailed technical analysis revealed distinct patterns in the credential exposure across different extension types. For example, the Avast Online Security & Privacy and AVG Online Security extensions embed Google Analytics 4 (GA4) API secrets like var GA4_API_SECRET = "2y-Q"; directly into JavaScript, allowing attackers to forge event data and compromise analytics integrity. Similarly, Equatio – Math Made Digital leaks Azure API keys (window.equatioAzureApiKey = "48!3";) used for speech recognition, giving adversaries the ability to consume Azure resources without authorization, which could lead to hefty cloud service bills for the developers behind the extension.
In the most alarming cases, AWS access keys (e.g., AWSAccessKeyId: "AKIA") were found in screenshot-related extensions, potentially allowing attackers to access AWS services like S3, upload malicious files, or pivot into connected infrastructure. If these keys have elevated privileges, the consequences could escalate into full-scale infrastructure compromise. This incident underlines the importance of secure secret management practices in client-facing code. Developers must urgently adopt secure credential storage practices, such as using environment variables, proxy APIs, and secret management tools, and browser vendors should enforce stricter auditing of extension submissions to prevent such negligent exposures in the future.
Impact
- Sensitive Data Theft
- Gain Access
- Privilege Escalation
Affected Vendors
Affected Products
- Google Chrome
Remediation
- Never hardcode credentials in client-side JavaScript or HTML files (e.g., API keys, tokens, secrets).
- Use a secure backend server to handle authentication and API requests that require sensitive keys.
- Implement environment variables and secret management tools (e.g., HashiCorp Vault, AWS Secrets Manager) to store credentials securely.
- Apply principle of least privilege (PoLP) to all API keys and tokens — only grant necessary permissions.
- Regularly rotate API keys and credentials to minimize the risk of long-term abuse.
- Perform static code analysis and security audits before publishing extensions to detect exposed secrets.
- Use content security policies (CSP) and proper permission scoping in manifest.json to limit extension capabilities.
- Monitor and restrict usage patterns of API keys to detect and block suspicious or excessive activity.
- Ensure extensions are submitted to the Chrome Web Store with a security review checklist, flagging any use of sensitive keys.