Menu
24matins.uk
Navigation : 
  • News
    • Business
    • Recipe
    • Sport
  • World
  • Health
  • Culture
  • Tech
    • Science
Currently : 
  • Entertainment
  • Health
  • Tech
  • International

Protect Your Chrome Browser from Syncjacking: Essential Tips

Tech
By 24matins.uk,  published 31 January 2025 at 15h31, updated on 31 January 2025 at 15h31.
Tech

Billions of Chrome users are at risk from a new browser hijacking attack known as Syncjacking. Learn how to protect yourself and ensure your data security.

Hackers Target Google Chrome

With its vast user base, the Google Chrome browser is a prime target for hackers. Browsers store a plethora of personal and sensitive information, making them attractive to cybercriminals. These criminals have recently developed sophisticated techniques to steal this data and take control of computers.

The Threat of ‘Browser Syncjacking’

Cybersecurity firm SquareX has identified a new attack known as ‘Browser Syncjacking.’ This attack is particularly perilous due to its stealthy nature and minimal permission requirements, making Chrome users especially vulnerable.

How Does This Attack Work?

Before targeting Chrome users, hackers set up a malicious Google Workspace domain with multiple user profiles where security features like multi-factor authentication are intentionally disabled. They then develop and launch a malicious Chrome extension on the Chrome Web Store, posing as a useful tool that users might want to add to Chrome.

Utilizing social engineering, hackers deceive users into installing this new extension. Once installed, it employs a hidden browser window to connect the victim to one of the previously created managed Workspace profiles. To deceive victims into activating Chrome sync on this new compromised profile, the extension opens a modified Google support page explaining how to enable synchronization.

How to Protect Against These Attacks?

To safeguard against this and similar attacks, it is advised to be cautious about installing new Chrome extensions and to limit those already installed. Before adding a new extension, thoroughly check the extension and its developers for any suspicious signs.

Additionally, it is better to store your passwords and other credentials in one of the top password managers, rather than in your browser. Hackers often target browsers for their attacks. By being extra cautious online, avoiding unnecessary extensions, software, or apps, and improving your digital hygiene, you can protect yourself from falling victim to these attacks.

Le Récap
  • Hackers Target Google Chrome
  • The Threat of ‘Browser Syncjacking’
  • How Does This Attack Work?
  • How to Protect Against These Attacks?
  • About Us
© 2026 - All rights reserved on 24matins.uk site content