![]() “Unfortunately, Google decided to disallow publisher signatures on Chrome extensions and is now relying solely on signing them automatically after upload to the Chrome webstore, which removes an important barrier to external compromise,” the company says. MEGAsync For Desktop, Chrome, Firefox, Edge, Opera, and Android is a freeware app that can synchronize all of your devices with your MEGA account. Speaking of Google, Mega lay some of the blame on Chrome and recent policy changes: Googles staff removed the extension one hour later and five hours after the initial breach. The extension has now been removed entirely from Google Chrome as the company investigates. MEGA.nz submitted a new, clean version of the extension to the Chrome Web Store, v3.39.5, four hours later. ![]() This will disable all third-party extensions and will delete your cache and cookies. The Google Chrome browser extension from the MEGA file storage service has been compromised and replaced with a malicious version that is can steal user. You can choose to synchronize your entire MEGA account or configure multiple. Access and work with your data securely across different locations and devices. If you are not on that build, your credentials should be fine. To resolve the Chrome failed network error, you might have to reset Chrome and restore it to its default settings. MEGAsync For Desktop, Chrome, Firefox, Edge, Opera, and Android is a freeware app that can synchronize all of your devices with your MEGA account. The update in question is version 3.39.4. With it, you can use up to 15GB for free or subscribe to. Mega says users who installed the extension or updated it during the compromise were affected. Google One is the app created specifically for mobile phones and tablets to back up and store important files on the cloud. “Please note that if you visited any site or made use of another extension that sends plain-text credentials through POST requests, either by direct form submission or through a background XMLHttpRequest process (MEGA is not one of them) while the trojaned extension was active, consider that your credentials were compromised on these sites and/or applications.” Extension RemovedĪny data that was stolen was sent to a server in Ukraine. In its blog, the company urged users to prepare for the fact their credentials were compromised and to change them: Additionally, the extension targeted private keys for cryptocurrency wallets. The goal of the attack was to find user information. MEGA for Chrome also utilizes live encrypted backup that includes real-time file synchronization and versioning features, ensuring that your data is safe and. Mega says the extension looked for data from websites like Microsoft Live, Google, Github, Amazon, and others.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |