{"id":35599,"date":"2020-06-18T15:53:49","date_gmt":"2020-06-18T15:53:49","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31310\/Massive-Spying-On-Users-Of-Googles-Chrome-Shows-New-Security-Weakness.html"},"modified":"2020-06-18T15:53:49","modified_gmt":"2020-06-18T15:53:49","slug":"massive-spying-on-users-of-googles-chrome-shows-new-security-weakness","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/","title":{"rendered":"Massive Spying On Users Of Google&#8217;s Chrome Shows New Security Weakness"},"content":{"rendered":"<p>SAN FRANCISCO (Reuters) &#8211; A newly discovered spyware effort attacked users through 32 million downloads of extensions to Google\u2019s market-leading Chrome web browser, researchers at Awake Security told Reuters, highlighting the tech industry\u2019s failure to protect browsers as they are used more for email, payroll and other sensitive functions.<\/p>\n<p>Alphabet Inc\u2019s (<span id=\"\u201dsymbol_GOOGL.O_0\u201d\"><a href=\"https:\/\/www.reuters.com\/companies\/GOOGL.O\">GOOGL.O<\/a><\/span>) Google said it removed more than 70 of the malicious add-ons from its official Chrome Web Store after being alerted by the researchers last month.<\/p>\n<p>\u201cWhen we are alerted of extensions in the Web Store that violate our policies, we take action and use those incidents as training material to improve our automated and manual analyses,\u201d Google spokesman Scott Westover told Reuters.<\/p>\n<p>Most of the free extensions purported to warn users about questionable websites or convert files from one format to another. Instead, they siphoned off browsing history and data that provided credentials for access to internal business tools.<\/p>\n<p>Based on the number of downloads, it was the most far-reaching malicious Chrome store campaign to date, according to Awake co-founder and chief scientist Gary Golomb.<\/p>\n<p>Google declined to discuss how the latest spyware compared with prior campaigns, the breadth of the damage, or why it did not detect and remove the bad extensions on its own despite past promises to supervise offerings more closely.<\/p>\n<p>It is unclear who was behind the effort to distribute the malware. Awake said the developers supplied fake contact information when they submitted the extensions to Google.<\/p>\n<p>\u201cAnything that gets you into somebody\u2019s browser or email or other sensitive areas would be a target for national espionage as well as organized crime,\u201d said former National Security Agency engineer Ben Johnson, who founded security companies Carbon Black and Obsidian Security.<\/p>\n<p>The extensions were designed to avoid detection by antivirus companies or security software that evaluates the reputations of web domains, Golomb said.<\/p>\n<p>If someone used the browser to surf the web on a home computer, it would connect to a series of websites and transmit information, the researchers found. Anyone using a corporate network, which would include security services, would not transmit the sensitive information or even reach the malicious versions of the websites.<\/p>\n<p>\u201cThis shows how attackers can use extremely simple methods to hide, in this case, thousands of malicious domains,\u201d Golomb said.<\/p>\n<p>After this story&#8217;s publication, Awake released its research, including the list of domains and extensions. <a href=\"https:\/\/awakesecurity.com\/blog\/the-internets-new-arms-dealers-malicious-domain-registrars\">here<\/a><\/p>\n<p>All of the domains in question, more than 15,000 linked to each other in total, were purchased from a small registrar in Israel, Galcomm, known formally as CommuniGal Communication Ltd.<\/p>\n<p>Awake said Galcomm should have known what was happening.<\/p>\n<p>In an email exchange, Galcomm owner Moshe Fogel told Reuters that his company had done nothing wrong.<\/p>\n<p>\u201cGalcomm is not involved, and not in complicity with any malicious activity whatsoever,\u201d Fogel wrote. \u201cYou can say exactly the opposite, we cooperate with law enforcement and security bodies to prevent as much as we can.\u201d<\/p>\n<p>Fogel said there was no record of the inquiries Golomb said he made in April and again in May to the company\u2019s email address for reporting abusive behavior, and he asked for a list of suspect domains.<\/p>\n<p>After publication, Fogel said the majority of those domain names were inactive and that he would continue to investigate the others.<\/p>\n<p>The Internet Corp for Assigned Names and Numbers, which oversees registrars, said it had received few complaints about Galcomm over the years, and none about malware.<\/p>\n<p>While deceptive extensions have been a problem for years, they are getting worse. They initially spewed unwanted advertisements, and now are more likely to install additional malicious programs or track where users are and what they are doing for government or commercial spies.<\/p>\n<div class=\"Image_container\" tabindex=\"-1\">\n<div class=\"LazyImage_container LazyImage_dark\"><img decoding=\"async\" src=\"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20\" aria-label=\"FILE PHOTO: The logo of Google is seen in Davos, Switzerland Januar 20, 2020. Picture taken January 20, 2020. REUTERS\/Arnd Wiegmann\">\n<\/div>\n<div class=\"Image_caption\"> <span>FILE PHOTO: The logo of Google is seen in Davos, Switzerland Januar 20, 2020. Picture taken January 20, 2020. REUTERS\/Arnd Wiegmann<\/span><\/div>\n<\/div>\n<p>Malicious developers have been using Google\u2019s Chrome Store as a conduit for a long time. After one in 10 submissions was deemed malicious, Google said in 2018 <a href=\"https:\/\/blog.chromium.org\/2018\/10\/trustworthy-chrome-extensions-by-default.html\">here<\/a> it would improve security, in part by increasing human review.<\/p>\n<p>But in February, independent researcher Jamila Kaya and Cisco Systems\u2019 Duo Security uncovered <a href=\"https:\/\/duo.com\/labs\/research\/crxcavator-malvertising-2020\">here<\/a> a similar Chrome campaign that stole data from about 1.7 million users. Google joined the investigation and found 500 fraudulent extensions.<\/p>\n<p>\u201cWe do regular sweeps to find extensions using similar techniques, code and behaviors,\u201d Google\u2019s Westover said, in identical language to what Google gave out after Duo\u2019s report.<\/p>\n<div class=\"Attribution_container\" readability=\"6.5\">\n<div class=\"Attribution_attribution\" readability=\"8\">\n<p class=\"Attribution_content\">Reporting by Joseph Menn; Editing by Greg Mitchell, Leslie Adler and Jonathan Oatis<\/p>\n<\/div>\n<\/div>\n<div class=\"StandardArticleBody_trustBadgeContainer\"><span class=\"StandardArticleBody_trustBadgeTitle\">Our Standards:<\/span><span class=\"trustBadgeUrl\"><a href=\"http:\/\/thomsonreuters.com\/en\/about-us\/trust-principles.html\">The Thomson Reuters Trust Principles.<\/a><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31310\/Massive-Spying-On-Users-Of-Googles-Chrome-Shows-New-Security-Weakness.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8725],"class_list":["post-35599","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacygooglespywarechrome"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Massive Spying On Users Of Google&#039;s Chrome Shows New Security Weakness 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Massive Spying On Users Of Google&#039;s Chrome Shows New Security Weakness 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-18T15:53:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Massive Spying On Users Of Google&#8217;s Chrome Shows New Security Weakness\",\"datePublished\":\"2020-06-18T15:53:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/\"},\"wordCount\":770,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s4.reutersmedia.net\\\/resources\\\/r\\\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20\",\"keywords\":[\"headline,hacker,privacy,google,spyware,chrome\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/\",\"name\":\"Massive Spying On Users Of Google's Chrome Shows New Security Weakness 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s4.reutersmedia.net\\\/resources\\\/r\\\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20\",\"datePublished\":\"2020-06-18T15:53:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/#primaryimage\",\"url\":\"https:\\\/\\\/s4.reutersmedia.net\\\/resources\\\/r\\\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20\",\"contentUrl\":\"https:\\\/\\\/s4.reutersmedia.net\\\/resources\\\/r\\\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,google,spyware,chrome\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacygooglespywarechrome\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Massive Spying On Users Of Google&#8217;s Chrome Shows New Security Weakness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Massive Spying On Users Of Google's Chrome Shows New Security Weakness 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/","og_locale":"en_US","og_type":"article","og_title":"Massive Spying On Users Of Google's Chrome Shows New Security Weakness 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-18T15:53:49+00:00","og_image":[{"url":"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Massive Spying On Users Of Google&#8217;s Chrome Shows New Security Weakness","datePublished":"2020-06-18T15:53:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/"},"wordCount":770,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/#primaryimage"},"thumbnailUrl":"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20","keywords":["headline,hacker,privacy,google,spyware,chrome"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/","url":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/","name":"Massive Spying On Users Of Google's Chrome Shows New Security Weakness 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/#primaryimage"},"thumbnailUrl":"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20","datePublished":"2020-06-18T15:53:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/#primaryimage","url":"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20","contentUrl":"https:\/\/s4.reutersmedia.net\/resources\/r\/?m=02&amp;d=20200618&amp;t=2&amp;i=1522654025&amp;r=LYNXMPEG5H0CT&amp;w=20"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/massive-spying-on-users-of-googles-chrome-shows-new-security-weakness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,google,spyware,chrome","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacygooglespywarechrome\/"},{"@type":"ListItem","position":3,"name":"Massive Spying On Users Of Google&#8217;s Chrome Shows New Security Weakness"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35599"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35599\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}