Security firm ReSecurity has identified a cluster of five malicious Google Chrome extensions designed to hijack authenticated sessions of enterprise users. These extensions masquerade as helpful tools for popular Software-as-a-Service (SaaS) platforms, including Workday and NetSuite, to trick employees into installing them. Once installed, the malware waits for the user to log into their legitimate corporate account and then steals the active session cookie or token. This session hijacking attack is particularly dangerous because it allows the threat actor to bypass all login-time security measures, including strong passwords and multi-factor authentication (MFA). The attacker can then use the stolen session to impersonate the user and access sensitive financial data, HR information, and other proprietary corporate data.
The attack leverages the trust users place in the Chrome Web Store and the perceived legitimacy of extensions that promise to enhance their workflow with enterprise applications. The core of the attack is not stealing passwords, but stealing the result of a successful authentication: the session token.
myworkday.com).This technique completely sidesteps the need to crack passwords or bypass MFA prompts, as the attacker is taking over a session that has already been authenticated.
This attack is a textbook example of T1185 - Browser Session Hijacking. The malicious Chrome extensions require permissions to read and modify data on the websites the user visits. The cookies permission is particularly powerful, as it allows the extension to access session tokens stored as cookies.
An example manifest.json for such an extension might include:
{
"name": "Super-Awesome Report Exporter for Workday",
"version": "1.0",
"manifest_version": 3,
"permissions": [
"cookies",
"storage",
"tabs"
],
"host_permissions": [
"*://*.myworkday.com/",
"*://*.netsuite.com/"
],
"background": {
"service_worker": "background.js"
}
}
The background.js script would contain the logic to monitor for successful logins and then use the chrome.cookies.get() API to steal the relevant session cookie and send it to the attacker.
A successful session hijacking attack on an enterprise SaaS platform can be devastating:
Since the attacker's actions appear to originate from a legitimate, authenticated user session, detecting the malicious activity can be extremely difficult.
User Geolocation Logon Pattern Analysis.Executable Denylisting.Use enterprise policies to create an allowlist of approved browser extensions and block all others.
Educate employees about the risks of installing unvetted browser extensions.
The most effective defense against malicious browser extensions is to prevent their installation in the first place. Organizations must use an enterprise browser management solution (like Google's Chrome Browser Cloud Management or Microsoft Endpoint Manager policies) to enforce a strict extension policy. Instead of a blocklist, which is always reactive, implement an allowlist. Define a small, curated list of extensions that are approved for business use after a thorough security review. Then, configure the policy to block the installation of any extension not on this list. This proactive control eliminates the attack vector entirely. For existing installations, run an audit to identify all non-allowlisted extensions and enforce their removal. This ensures that employees cannot be tricked into installing session-hijacking malware from the Chrome Web Store.
To detect a session hijacking attack in progress, organizations must analyze their SaaS application logs for impossible travel scenarios. This involves ingesting audit logs from platforms like Workday and NetSuite into a SIEM or UEBA tool. The system should track the source IP address and approximate geolocation for each user's active session. A high-priority alert should be triggered if activity for a single user session is detected from two geographically distant locations within a short time frame (e.g., a login from New York followed by an action from an IP in Eastern Europe five minutes later). This is a strong indicator that the session token has been stolen and is being used by an attacker. The automated response to such an alert should be to immediately terminate all active sessions for that user, forcing re-authentication and invalidating the stolen token.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats