{"id":3240,"date":"2025-09-11T10:10:16","date_gmt":"2025-09-11T10:10:16","guid":{"rendered":"https:\/\/cert-mu.govmu.org\/cert-mu\/?page_id=3240"},"modified":"2025-09-11T10:10:54","modified_gmt":"2025-09-11T10:10:54","slug":"chrome-extension-scam-exposed-hackers-stealing-meta-accounts","status":"publish","type":"page","link":"https:\/\/cert-mu.govmu.org\/cert-mu\/?page_id=3240","title":{"rendered":"Chrome Extension Scam Exposed: Hackers Stealing Meta Accounts"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3240\" class=\"elementor elementor-3240\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4984c14 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4984c14\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40b3858\" data-id=\"40b3858\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b75f9a elementor-widget elementor-widget-text-editor\" data-id=\"8b75f9a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A sophisticated campaign targeting Meta advertisers through fake AI-powered ad optimization tools has been uncovered, with cybercriminals deploying malicious Chrome extensions to steal credentials and hijack business accounts.<\/p><p>Cybereason Security Services has identified an evolving malicious Chrome extension campaign that specifically targets Meta (Facebook\/Instagram) advertisers through a deceptive platform called \u201cMadgicx Plus.\u201d<\/p><p>This fake AI-driven ad optimization tool represents the latest iteration of a broader campaign previously documented by DomainTools, demonstrating how threat actors adapt their social engineering tactics while recycling existing infrastructure.<\/p><p>The campaign leverages the legitimate reputation of Madgicx, a well-known advertising technology company, by creating convincing impersonation websites that promote fake browser extensions.<\/p><p>Read More:<\/p><p><a href=\"https:\/\/gbhackers.com\/chrome-extension-scam\/\">https:\/\/gbhackers.com\/chrome-extension-scam\/<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A sophisticated campaign targeting Meta advertisers through fake AI-powered ad optimization tools has been uncovered, with cybercriminals deploying malicious Chrome extensions to steal credentials and hijack business accounts. Cybereason Security Services has identified an evolving malicious Chrome extension campaign that specifically targets Meta (Facebook\/Instagram) advertisers through a deceptive platform called \u201cMadgicx Plus.\u201d This fake AI-driven ad optimization tool represents the latest iteration of a broader campaign previously documented by DomainTools, demonstrating how threat actors adapt their social engineering tactics while recycling existing infrastructure. The campaign leverages the legitimate reputation of Madgicx, a well-known advertising technology company, by creating convincing impersonation\u2026<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3240","page","type-page","status-publish","hentry"],"blocksy_meta":"","_links":{"self":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages\/3240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3240"}],"version-history":[{"count":4,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages\/3240\/revisions"}],"predecessor-version":[{"id":3245,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages\/3240\/revisions\/3245"}],"wp:attachment":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}