• Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials

    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks.
    "Several widely used extensionsunintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext."
    The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middleattacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences.

    The list of identified extensions are below -

    SEMRush Rankand PI Rank, which call the URL "rank.trelliancom" over plain HTTP
    Browsec VPN, which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonawscom" when a user attempts to uninstall the extension
    MSN New Taband MSN Homepage, Bing Search & News, which transmit a unique machine identifier and other details over HTTP to "g.ceipmsncom"
    DualSafe Password Manager & Digital Vault, which constructs an HTTP-based URL request to "stats.itopupdatecom" along with information about the extension version, user's browser language, and usage "type"

    "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said.
    Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions -

    Online Security & Privacy extension, AVG Online Security, Speed Dial- New Tab Page, 3D, Sync, and SellerSprite - Amazon Research Tool, which expose a hard-coded Google Analytics 4API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics
    Equatio – Math Made Digital, which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits
    Awesome Screen Recorder & Screenshotand Scrolling Screenshot Tool & Screen Capture, which expose the developer's Amazon Web Servicesaccess key used to upload screenshots to the developer's S3 bucket
    Microsoft Editor – Spelling & Grammar Checker, which exposes a telemetry key named "StatsApiKey" to log user data for analytics
    Antidote Connector, which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys.
    Watch2Gether, which exposes a Tenor GIF search API key
    Trust Wallet, which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app
    TravelArrow – Your Virtual Travel Agent, which exposes a geolocation API key when making queries to "ip-apicom"

    Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned.
    Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec.

    "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side."
    Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk.
    The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk.
    "Users of these extensions should consider removing them until the developers address the insecurecalls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks."
    "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    #popular #chrome #extensions #leak #api
    Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials
    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. "Several widely used extensionsunintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext." The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middleattacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences. The list of identified extensions are below - SEMRush Rankand PI Rank, which call the URL "rank.trelliancom" over plain HTTP Browsec VPN, which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonawscom" when a user attempts to uninstall the extension MSN New Taband MSN Homepage, Bing Search & News, which transmit a unique machine identifier and other details over HTTP to "g.ceipmsncom" DualSafe Password Manager & Digital Vault, which constructs an HTTP-based URL request to "stats.itopupdatecom" along with information about the extension version, user's browser language, and usage "type" "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said. Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions - Online Security & Privacy extension, AVG Online Security, Speed Dial- New Tab Page, 3D, Sync, and SellerSprite - Amazon Research Tool, which expose a hard-coded Google Analytics 4API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics Equatio – Math Made Digital, which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits Awesome Screen Recorder & Screenshotand Scrolling Screenshot Tool & Screen Capture, which expose the developer's Amazon Web Servicesaccess key used to upload screenshots to the developer's S3 bucket Microsoft Editor – Spelling & Grammar Checker, which exposes a telemetry key named "StatsApiKey" to log user data for analytics Antidote Connector, which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys. Watch2Gether, which exposes a Tenor GIF search API key Trust Wallet, which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app TravelArrow – Your Virtual Travel Agent, which exposes a geolocation API key when making queries to "ip-apicom" Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned. Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec. "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side." Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk. The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk. "Users of these extensions should consider removing them until the developers address the insecurecalls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks." "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. #popular #chrome #extensions #leak #api
    Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials
    thehackernews.com
    Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. "Several widely used extensions [...] unintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response team, said. "By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext." The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middle (AitM) attacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences. The list of identified extensions are below - SEMRush Rank (extension ID: idbhoeaiokcojcgappfigpifhpkjgmab) and PI Rank (ID: ccgdboldgdlngcgfdolahmiilojmfndl), which call the URL "rank.trellian[.]com" over plain HTTP Browsec VPN (ID: omghfjlpggmjjaagoclmmobgdodcjboh), which uses HTTP to call an uninstall URL at "browsec-uninstall.s3-website.eu-central-1.amazonaws[.]com" when a user attempts to uninstall the extension MSN New Tab (ID: lklfbkdigihjaaeamncibechhgalldgl) and MSN Homepage, Bing Search & News (ID: midiombanaceofjhodpdibeppmnamfcj), which transmit a unique machine identifier and other details over HTTP to "g.ceipmsn[.]com" DualSafe Password Manager & Digital Vault (ID: lgbjhdkjmpgjgcbcdlhkokkckpjmedgc), which constructs an HTTP-based URL request to "stats.itopupdate[.]com" along with information about the extension version, user's browser language, and usage "type" "Although credentials or passwords do not appear to be leaked, the fact that a password manager uses unencrypted requests for telemetry erodes trust in its overall security posture," Guo said. Symantec said it also identified another set of extensions with API keys, secrets, and tokens directly embedded in the JavaScript code, which an attacker could weaponize to craft malicious requests and carry out various malicious actions - Online Security & Privacy extension (ID: gomekmidlodglbbmalcneegieacbdmki), AVG Online Security (ID: nbmoafcmbajniiapeidgficgifbfmjfo), Speed Dial [FVD] - New Tab Page, 3D, Sync (ID: llaficoajjainaijghjlofdfmbjpebpa), and SellerSprite - Amazon Research Tool (ID: lnbmbgocenenhhhdojdielgnmeflbnfb), which expose a hard-coded Google Analytics 4 (GA4) API secret that an attacker could use to bombard the GA4 endpoint and corrupt metrics Equatio – Math Made Digital (ID: hjngolefdpdnooamgdldlkjgmdcmcjnc), which embeds a Microsoft Azure API key used for speech recognition that an attacker could use to inflate the developer's costs or exhaust their usage limits Awesome Screen Recorder & Screenshot (ID: nlipoenfbbikpbjkfpfillcgkoblgpmj) and Scrolling Screenshot Tool & Screen Capture (ID: mfpiaehgjbbfednooihadalhehabhcjo), which expose the developer's Amazon Web Services (AWS) access key used to upload screenshots to the developer's S3 bucket Microsoft Editor – Spelling & Grammar Checker (ID: gpaiobkfhnonedkhhfjpmhdalgeoebfa), which exposes a telemetry key named "StatsApiKey" to log user data for analytics Antidote Connector (ID: lmbopdiikkamfphhgcckcjhojnokgfeo), which incorporates a third-party library called InboxSDK that contains hard-coded credentials, including API keys. Watch2Gether (ID: cimpffimgeipdhnhjohpbehjkcdpjolg), which exposes a Tenor GIF search API key Trust Wallet (ID: egjidjbpglichdcondbcbdnbeeppgdph), which exposes an API key associated with the Ramp Network, a Web3 platform that offers wallet developers a way to let users buy or sell crypto directly from the app TravelArrow – Your Virtual Travel Agent (ID: coplmfnphahpcknbchcehdikbdieognn), which exposes a geolocation API key when making queries to "ip-api[.]com" Attackers who end up finding these keys could weaponize them to drive up API costs, host illegal content, send spoofed telemetry data, and mimic cryptocurrency transaction orders, some of which could see the developer's ban getting banned. Adding to the concern, Antidote Connector is just one of over 90 extensions that use InboxSDK, meaning the other extensions are susceptible to the same problem. The names of the other extensions were not disclosed by Symantec. "From GA4 analytics secrets to Azure speech keys, and from AWS S3 credentials to Google-specific tokens, each of these snippets demonstrates how a few lines of code can jeopardize an entire service," Guo said. "The solution: never store sensitive credentials on the client side." Developers are recommended to switch to HTTPS whenever they send or receive data, store credentials securely in a backend server using a credentials management service, and regularly rotate secrets to further minimize risk. The findings show how even popular extensions with hundreds of thousands of installations can suffer from trivial misconfigurations and security blunders like hard-coded credentials, leaving users' data at risk. "Users of these extensions should consider removing them until the developers address the insecure [HTTP] calls," the company said. "The risk is not just theoretical; unencrypted traffic is simple to capture, and the data can be used for profiling, phishing, or other targeted attacks." "The overarching lesson is that a large install base or a well-known brand does not necessarily ensure best practices around encryption. Extensions should be scrutinized for the protocols they use and the data they share, to ensure users' information remains truly safe." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.
    Like
    Love
    Wow
    Sad
    Angry
    334
    · 0 Commenti ·0 condivisioni ·0 Anteprima
  • Self-destructing graphics cards: Why are power connectors melting, and what can you do about it?

    12VHPWR and 12V-2x6 power connectors are still melting and taking graphics cards with them.
    #selfdestructing #graphics #cards #why #are
    Self-destructing graphics cards: Why are power connectors melting, and what can you do about it?
    12VHPWR and 12V-2x6 power connectors are still melting and taking graphics cards with them. #selfdestructing #graphics #cards #why #are
    Self-destructing graphics cards: Why are power connectors melting, and what can you do about it?
    www.tomshardware.com
    12VHPWR and 12V-2x6 power connectors are still melting and taking graphics cards with them.
    Like
    Love
    Wow
    Sad
    Angry
    309
    · 0 Commenti ·0 condivisioni ·0 Anteprima
  • OpenAI hits 3M business users and launches workplace tools to take on Microsoft

    OpenAI reaches 3 million paying business users with 50% growth since February, launching new workplace AI tools including connectors and coding agents to compete with Microsoft.Read More
    #openai #hits #business #users #launches
    OpenAI hits 3M business users and launches workplace tools to take on Microsoft
    OpenAI reaches 3 million paying business users with 50% growth since February, launching new workplace AI tools including connectors and coding agents to compete with Microsoft.Read More #openai #hits #business #users #launches
    OpenAI hits 3M business users and launches workplace tools to take on Microsoft
    venturebeat.com
    OpenAI reaches 3 million paying business users with 50% growth since February, launching new workplace AI tools including connectors and coding agents to compete with Microsoft.Read More
    Like
    Love
    Wow
    Angry
    Sad
    236
    · 0 Commenti ·0 condivisioni ·0 Anteprima
  • OpenAI Brings ChatGPT Record Mode on MacOS, Adds Tool to Connect to Gmail and Outlook

    Photo Credit: Unsplash/Solen Feyissa Connectors on ChatGPT is not available in European Union countries, China, and the UK

    Highlights

    With Record Mode, ChatGPT can transcribe and summarise meetings
    ChatGPT’s Connector feature works only with Deep Research
    It is available to all the paid subscribers of ChatGPT

    Advertisement

    OpenAI released two new utility features for ChatGPT users on Wednesday. The artificial intelligenceapp on MacOS now has a Record Mode that can capture meetings, brainstorming sessions, and voice notes, and transcribe and summarise the main discussion points. This feature is currently only available to the ChatGPT Team subscribers. Additionally, the San Francisco-based AI firm is also introducing Connectors, which is a tool that lets the chatbot connect to the user's internal cloud-based data sources such as Gmail, Outlook, Google Drive, and more.ChatGPT Can Now Record Your MeetingsIn a series of posts on X, the official handle of OpenAI announced the new ChatGPT features. The company also hosted a live stream on YouTube to provide a demonstration of these business-focused features. Both of these features are exclusive to the company's paid subscribers, however, the Record Mode is only aimed at the Team users. Additionally, Record Mode is not available in the European Economic Area, China, and the UK.Record Mode is a new capability available on ChatGPT's macOS desktop app. Team users can now tap the new Record button at the bottom of any chat. Once the user has given permission for microphone, the chatbot will begin capturing the meeting. It can also record voice notes. Once the session has ended, it can provide an editable summary of the conversation as well as its recording.OpenAI says users will be able to search for past meetings, references to them during conversations, and bring relevant context. The transcripts of the meetings also get saved as a canvas in the user's chat history. This transcript can also be rewritten as an email, project plans, or code scaffold. Notably, the tool can record up to 120 minutes per session.Separately, the AI firm also released Connectors. The tool allows ChatGPT to connect to third-party internal data sources and retrieve information in real-time. The feature works with Outlook, Teams, Google Drive, Gmail, Linear, and more. The Team, Enterprise, and Edu subscribers can also connect to SharePoint, DropBox, and Box. Connectors will only work when using Deep Research.

    OpenAI is also letting workspace admins build custom Deep Research Connectors using Model Context Protocolin beta.

    For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

    Further reading:
    OpenAI, ChatGPT, AI, Artificial Intelligence, Apps

    Akash Dutta

    Akash Dutta is a Senior Sub Editor at Gadgets 360. He is particularly interested in the social impact of technological developments and loves reading about emerging fields such as AI, metaverse, and fediverse. In his free time, he can be seen supporting his favourite football club - Chelsea, watching movies and anime, and sharing passionate opinions on food.
    More

    Related Stories
    #openai #brings #chatgpt #record #mode
    OpenAI Brings ChatGPT Record Mode on MacOS, Adds Tool to Connect to Gmail and Outlook
    Photo Credit: Unsplash/Solen Feyissa Connectors on ChatGPT is not available in European Union countries, China, and the UK Highlights With Record Mode, ChatGPT can transcribe and summarise meetings ChatGPT’s Connector feature works only with Deep Research It is available to all the paid subscribers of ChatGPT Advertisement OpenAI released two new utility features for ChatGPT users on Wednesday. The artificial intelligenceapp on MacOS now has a Record Mode that can capture meetings, brainstorming sessions, and voice notes, and transcribe and summarise the main discussion points. This feature is currently only available to the ChatGPT Team subscribers. Additionally, the San Francisco-based AI firm is also introducing Connectors, which is a tool that lets the chatbot connect to the user's internal cloud-based data sources such as Gmail, Outlook, Google Drive, and more.ChatGPT Can Now Record Your MeetingsIn a series of posts on X, the official handle of OpenAI announced the new ChatGPT features. The company also hosted a live stream on YouTube to provide a demonstration of these business-focused features. Both of these features are exclusive to the company's paid subscribers, however, the Record Mode is only aimed at the Team users. Additionally, Record Mode is not available in the European Economic Area, China, and the UK.Record Mode is a new capability available on ChatGPT's macOS desktop app. Team users can now tap the new Record button at the bottom of any chat. Once the user has given permission for microphone, the chatbot will begin capturing the meeting. It can also record voice notes. Once the session has ended, it can provide an editable summary of the conversation as well as its recording.OpenAI says users will be able to search for past meetings, references to them during conversations, and bring relevant context. The transcripts of the meetings also get saved as a canvas in the user's chat history. This transcript can also be rewritten as an email, project plans, or code scaffold. Notably, the tool can record up to 120 minutes per session.Separately, the AI firm also released Connectors. The tool allows ChatGPT to connect to third-party internal data sources and retrieve information in real-time. The feature works with Outlook, Teams, Google Drive, Gmail, Linear, and more. The Team, Enterprise, and Edu subscribers can also connect to SharePoint, DropBox, and Box. Connectors will only work when using Deep Research. OpenAI is also letting workspace admins build custom Deep Research Connectors using Model Context Protocolin beta. For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube. Further reading: OpenAI, ChatGPT, AI, Artificial Intelligence, Apps Akash Dutta Akash Dutta is a Senior Sub Editor at Gadgets 360. He is particularly interested in the social impact of technological developments and loves reading about emerging fields such as AI, metaverse, and fediverse. In his free time, he can be seen supporting his favourite football club - Chelsea, watching movies and anime, and sharing passionate opinions on food. More Related Stories #openai #brings #chatgpt #record #mode
    OpenAI Brings ChatGPT Record Mode on MacOS, Adds Tool to Connect to Gmail and Outlook
    www.gadgets360.com
    Photo Credit: Unsplash/Solen Feyissa Connectors on ChatGPT is not available in European Union countries, China, and the UK Highlights With Record Mode, ChatGPT can transcribe and summarise meetings ChatGPT’s Connector feature works only with Deep Research It is available to all the paid subscribers of ChatGPT Advertisement OpenAI released two new utility features for ChatGPT users on Wednesday. The artificial intelligence (AI) app on MacOS now has a Record Mode that can capture meetings, brainstorming sessions, and voice notes, and transcribe and summarise the main discussion points. This feature is currently only available to the ChatGPT Team subscribers. Additionally, the San Francisco-based AI firm is also introducing Connectors, which is a tool that lets the chatbot connect to the user's internal cloud-based data sources such as Gmail, Outlook, Google Drive, and more.ChatGPT Can Now Record Your MeetingsIn a series of posts on X (formerly known as Twitter), the official handle of OpenAI announced the new ChatGPT features. The company also hosted a live stream on YouTube to provide a demonstration of these business-focused features. Both of these features are exclusive to the company's paid subscribers, however, the Record Mode is only aimed at the Team users. Additionally, Record Mode is not available in the European Economic Area (EEA), China, and the UK.Record Mode is a new capability available on ChatGPT's macOS desktop app. Team users can now tap the new Record button at the bottom of any chat. Once the user has given permission for microphone, the chatbot will begin capturing the meeting. It can also record voice notes. Once the session has ended, it can provide an editable summary of the conversation as well as its recording.OpenAI says users will be able to search for past meetings, references to them during conversations, and bring relevant context. The transcripts of the meetings also get saved as a canvas in the user's chat history. This transcript can also be rewritten as an email, project plans, or code scaffold. Notably, the tool can record up to 120 minutes per session.Separately, the AI firm also released Connectors. The tool allows ChatGPT to connect to third-party internal data sources and retrieve information in real-time. The feature works with Outlook, Teams, Google Drive, Gmail, Linear, and more. The Team, Enterprise, and Edu subscribers can also connect to SharePoint, DropBox, and Box. Connectors will only work when using Deep Research. OpenAI is also letting workspace admins build custom Deep Research Connectors using Model Context Protocol (MCP) in beta. For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube. Further reading: OpenAI, ChatGPT, AI, Artificial Intelligence, Apps Akash Dutta Akash Dutta is a Senior Sub Editor at Gadgets 360. He is particularly interested in the social impact of technological developments and loves reading about emerging fields such as AI, metaverse, and fediverse. In his free time, he can be seen supporting his favourite football club - Chelsea, watching movies and anime, and sharing passionate opinions on food. More Related Stories
    Like
    Love
    Wow
    Sad
    Angry
    322
    · 0 Commenti ·0 condivisioni ·0 Anteprima
CGShares https://cgshares.com