Rilide Malware Targets Chrome and Edge Users by Masquerading as a Browser Extension

Rilide malware, first identified in April 2023, has emerged as a significant threat to users of Chromium-based browsers, including Google Chrome, Microsoft Edge, Brave, and Opera.

This malicious browser extension is designed to masquerade as legitimate extensions, such as those for Google Drive, allowing it to operate undetected while stealing sensitive user data.

Rilide’s capabilities include monitoring browsing history, capturing screenshots, and injecting malicious scripts to compromise email and cryptocurrency accounts.

Rilide Malware
Intrusion chain observed during analysis

Sophistication and Updates

The latest version of Rilide has shown increased sophistication by adapting to the Chrome Extension Manifest V3, a security update aimed at limiting the capabilities of browser extensions.

Despite these restrictions, Rilide manages to execute malicious JavaScript code using inline events, enabling it to bypass security measures intended to prevent such actions.

Additionally, it can exfiltrate stolen data via Telegram channels or by capturing screenshots at predefined intervals, further enhancing its data theft capabilities.

Rilide Malware
Decoded content from tcl-black[.]com reveals additional PowerShell Commands 

Distribution and Impact

Rilide is distributed through various means, including fake landing pages and vishing tactics that trick users into installing the malware.

According to Pulsidive Report, it has been observed impersonating legitimate applications like Palo Alto Networks’ GlobalProtect to deceive users.

The malware is sold on dark web forums for $5,000, making it accessible to a wide range of cybercriminals.

Its impact extends beyond individual users, as it has been used in targeted campaigns against enterprise employees, often through seemingly innocuous documents like PowerPoint guides.

Given the evolving nature of Rilide and its ability to evade detection by adapting to new security measures, users must remain vigilant.

It is crucial to verify the authenticity of browser extensions before installation and to monitor browser activity for suspicious behavior.

Cybersecurity experts continue to track Rilide’s developments, emphasizing the need for robust security protocols to protect against such sophisticated threats.

Find this Story Interesting! Follow us on LinkedIn, and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here