{"id":103832,"date":"2025-04-25T11:37:16","date_gmt":"2025-04-25T18:37:16","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=103832"},"modified":"2025-04-25T14:44:05","modified_gmt":"2025-04-25T21:44:05","slug":"cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/","title":{"rendered":"&#8220;Cookie-Bite&#8221; attack: How Chrome extensions can hijack site logins"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-103854 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/creepy-potentially-dangerous-Google-Chrome-extensions-cookies-purple-bg-600x300-1.jpg\" alt=\"A creepy Google Chrome browser extension with its eye staring at a cookie\" width=\"600\" height=\"300\" \/><\/p>\n<p>Though popular, Web browsers extensions are not necessarily safe. Just like any software you might install on your computer, they can contain malicious code designed to do evil things. The latest demonstration of extensions&#8217; potential harm comes in the form of a proof-of-concept (PoC) malware attack. Security researchers have developed &#8220;Cookie-Bite,&#8221; which exhibits how Chrome extensions can surreptitiously hijack session tokens.<\/p>\n<p>In plain English, that means that bad guys can log into almost any site as if they were you. And all they have to do is trick you into installing a seemingly harmless browser extension. Or, if they&#8217;ve gained access to your computer, they can install the malicious extension without you knowing about it.<\/p>\n<p>Let&#8217;s explain how the Cookie-Bite attack concept works\u2014and why you might want to avoid installing extensions in general.<\/p>\n<h3>How the Cookie-Bite PoC attack works<\/h3>\n<p>Generally speaking, whenever you log into a site, you have to enter your username and password. You might even have to go through an additional step, for <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\">two-factor authentication<\/a> (2FA, aka two-step verification or 2SV). After that, your browser creates a &#8220;session cookie&#8221;\u2014a text file containing coded information that keeps you logged into the site. If a threat actor steals that cookie and puts it on their own computer, they&#8217;ll usually be instantly logged in as you\u2014bypassing the need to have your username, password, and 2FA method.<\/p>\n<p>The researchers who developed Cookie-Bite <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cookie-bite-attack-poc-uses-chrome-extension-to-steal-session-tokens\/\" target=\"_blank\" rel=\"noopener\">limited its scope<\/a> to stealing Microsoft cookies used for authentication. But, they point out, it could just as easily be redesigned to steal cookies related to Google or any number of other sites\u2014presumably including Apple services like iCloud.<\/p>\n<p>Cookie-Bite monitors whenever the victim visits Microsoft login pages. As soon as the browser saves the cookies, the extension exfiltrates them to the attacker. It does so by submitting a Google Form in the background\u2014entirely without the user&#8217;s knowledge or consent.<\/p>\n<p>When the researchers uploaded their proof-of-concept extension to VirusTotal, none of its more than 60 antivirus engines detected the extension as malicious.<\/p>\n<p>Although the extension was designed to work with Google Chrome, it would presumably work in most of today&#8217;s Mac, Windows, and Linux browsers. Chrome is the most popular desktop browser in the world, with a roughly <a href=\"https:\/\/gs.statcounter.com\/browser-version-partially-combined-market-share\/desktop\/worldwide\" target=\"_blank\" rel=\"noopener\">66% market share<\/a>. Microsoft Edge\u2014which is also based on Chromium, the open-source version of Chrome\u2014is number two, with a 13% market share. These and other Chromium-based browsers support extensions from Google&#8217;s <a href=\"https:\/\/chromewebstore.google.com\/\" target=\"_blank\" rel=\"noopener\">Chrome Web Store<\/a>.<\/p>\n<h3>Avoid extensions whenever possible<\/h3>\n<p>In the past, we&#8217;ve reported pretty extensively about why it&#8217;s crucial to avoid installing browser extensions.<\/p>\n<p>A couple years ago, we <a href=\"https:\/\/www.intego.com\/mac-security-blog\/wwdc-new-macs-macos-sonoma-ios-ipados-17-and-vision-pro-intego-mac-podcast-episode-295\/#:~:text=Malicious%20Chrome%20browser%20extensions%20purged%20from%20the%20Chrome%20Web%20Store\">noted<\/a> on the <a href=\"https:\/\/podcast.intego.com\">Intego Mac Podcast<\/a> that dozens of extensions in the Chrome Web Store contained unwanted and undisclosed search-hijacking code. These extensions had been installed 87 million times before Google finally removed them from the store.<\/p>\n<p>Even good extensions can turn bad. Developers often lose interest in working on a project; many threat actors posing as legitimate developers swoop in and offer money to take over abandoned projects.<\/p>\n<p>On top of that, overtly malicious extensions have also made their way into the Chrome Web Store. As just one example, in March 2023 we wrote about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/fakegpt-trojanized-chatgpt-chrome-extension-hijacks-facebook-accounts\/\">a fake ChatGPT extension that hijacked Facebook accounts<\/a>. It used a method similar to the Cookie-Bite PoC, but this &#8220;FakeGPT&#8221; was actual, in-the-wild malware.<\/p>\n<p>And malware isn&#8217;t the only concern. Just this past August, we wrote about how <a href=\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/\">40,000 extensions\u2014with 500 million users\u2014contained at least one known vulnerability<\/a>. This accounted for almost one-third of all extensions in the Chrome Web Store at the time.<\/p>\n<p>My recommendation is to <strong>avoid using any extensions at all\u2014unless you&#8217;re absolutely sure you can trust the developer.<\/strong><\/p>\n<p>Advertisement and tracker blockers are among the most popular extensions. The only ad-blocking extension that I both trust and personally use is <a href=\"https:\/\/github.com\/gorhill\/uBlock?tab=readme-ov-file#:~:text=uBlock%20Origin%20(uBO)\" target=\"_blank\" rel=\"noopener\">uBlock Origin<\/a> by Raymond Hill. Wladimir Palant&#8217;s <a href=\"https:\/\/adblockplus.org\/en\/download\" target=\"_blank\" rel=\"noopener\">Adblock Plus<\/a> is fine, too; both developers understand browser security well. Better yet, you can use a browser with built-in ad blocking, such as <a href=\"https:\/\/brave.com\/\" target=\"_blank\" rel=\"noopener\">Brave<\/a>, a privacy-focused, Chromium-based browser; see our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/safari-chrome-firefox-which-is-the-most-private-browser-for-mac\/\" target=\"_blank\" rel=\"noopener\">comparison of desktop browser privacy<\/a>.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>We discussed Cookie-Bite in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/reverse-engineering-intego-mac-podcast-episode-393\/\">episode 393<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a>:<\/p>\n<p><iframe style=\"width: 100%; max-width: 660px; overflow: hidden; border-radius: 10px;\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/episode-393-reverse-engineering\/id1293834627?i=1000704711585\" height=\"175\" frameborder=\"0\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>Additionally, in August we previously covered other reasons <a href=\"http:\/\/Chrome extensions are a security nightmare; here's why you should avoid them\">why browser extensions are a security nightmare<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"wwDFGv6G6c\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/\">Chrome extensions are a security nightmare; here&#8217;s why you should avoid them<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Chrome extensions are a security nightmare; here&#8217;s why you should avoid them&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/chrome-extensions-are-a-security-nightmare-heres-why-you-should-avoid-them\/embed\/#?secret=wwDFGv6G6c\" data-secret=\"wwDFGv6G6c\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security, and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.<\/p>\n","protected":false},"author":14,"featured_media":103841,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4543,38,173,2389,181,4607],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Cookie-Bite&quot; attack: How Chrome extensions can hijack site logins - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-25T18:37:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T21:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/creepy-potentially-dangerous-Google-Chrome-extensions-cookies-purple-bg-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/creepy-potentially-dangerous-Google-Chrome-extensions-cookies-purple-bg-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/creepy-potentially-dangerous-Google-Chrome-extensions-cookies-purple-bg-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Creepy, potentially dangerous Google Chrome browser extensions with eyes staring at cookies purple background\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/\",\"name\":\"\\\"Cookie-Bite\\\" attack: How Chrome extensions can hijack site logins - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#primaryimage\"},\"datePublished\":\"2025-04-25T18:37:16+00:00\",\"dateModified\":\"2025-04-25T21:44:05+00:00\",\"description\":\"Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Cookie-Bite&#8221; attack: How Chrome extensions can hijack site logins\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"&#8220;Cookie-Bite&#8221; attack: How Chrome extensions can hijack site logins\",\"datePublished\":\"2025-04-25T18:37:16+00:00\",\"dateModified\":\"2025-04-25T21:44:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#webpage\"},\"wordCount\":804,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/creepy-potentially-dangerous-Google-Chrome-extensions-cookies-purple-bg-400x260-1.jpg\",\"keywords\":[\"Brave\",\"Chrome\",\"Chrome Browser\",\"Extensions\",\"Google Chrome\",\"Microsoft Edge\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/","og_locale":"en_US","og_type":"article","og_title":"\"Cookie-Bite\" attack: How Chrome extensions can hijack site logins - The Mac Security Blog","og_description":"Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2025-04-25T18:37:16+00:00","article_modified_time":"2025-04-25T21:44:05+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/creepy-potentially-dangerous-Google-Chrome-extensions-cookies-purple-bg-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/creepy-potentially-dangerous-Google-Chrome-extensions-cookies-purple-bg-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/creepy-potentially-dangerous-Google-Chrome-extensions-cookies-purple-bg-400x260-1.jpg","width":400,"height":260,"caption":"Creepy, potentially dangerous Google Chrome browser extensions with eyes staring at cookies purple background"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/","name":"\"Cookie-Bite\" attack: How Chrome extensions can hijack site logins - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#primaryimage"},"datePublished":"2025-04-25T18:37:16+00:00","dateModified":"2025-04-25T21:44:05+00:00","description":"Cookie-Bite proves what we already knew: browser extensions can be very dangerous to your security and privacy. Learn how malware extensions can steal session cookies and let hackers sign into your accounts.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"&#8220;Cookie-Bite&#8221; attack: How Chrome extensions can hijack site logins"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"&#8220;Cookie-Bite&#8221; attack: How Chrome extensions can hijack site logins","datePublished":"2025-04-25T18:37:16+00:00","dateModified":"2025-04-25T21:44:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#webpage"},"wordCount":804,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/creepy-potentially-dangerous-Google-Chrome-extensions-cookies-purple-bg-400x260-1.jpg","keywords":["Brave","Chrome","Chrome Browser","Extensions","Google Chrome","Microsoft Edge"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/cookie-bite-attack-how-chrome-extensions-can-hijack-site-logins\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/04\/creepy-potentially-dangerous-Google-Chrome-extensions-cookies-purple-bg-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-r0I","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103832"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=103832"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103832\/revisions"}],"predecessor-version":[{"id":103856,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103832\/revisions\/103856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/103841"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=103832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=103832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=103832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}