Supply chain security firm Socket discovered five malicious Chrome extensions masquerading as tools for Workday, NetSuite, and SAP SuccessFactors. The extensions accumulated over 2,300 installs before Google removed most of them from the Chrome Web Store—though at least one remains available.

Incident overview

AttributeDetails
DiscoverySocket Threat Research Team
Extensions identified5
Total installs2,300+
Target platformsWorkday, NetSuite, SAP SuccessFactors
Attack typesCookie theft, DOM manipulation, session hijacking
Status4 removed, 1 still active

Timeline

DateEvent
January 2026Socket identifies malicious extensions
January 17, 2026Socket publishes analysis
January 19, 2026Google removes four of five extensions
OngoingSoftware Access extension still in Chrome Web Store

Malicious extensions

Extension NameExtension IDPublisherInstallsStatus
DataByCloud 2lfjbffniigfppmjgljbijdohnnekpdaedatabycloud1104Part of 2,300+Removed
Tool Access 11dcdfcdigcalagpeoojgnaeaibphimepfdatabycloud1104Part of 2,300+Removed
DataByCloud Accessohgbakjjcfcbkihohlklcfijlpbbjimcdatabycloud1104Part of 2,300+Removed
Data By Cloud 1fffijllacnghojlghnffhehloockfbakdatabycloud1104~1,000Removed
Software AccessknoedgofjnaekopeocjimgbbnhmjebgjDifferent brandingUnknownStill active

Despite different names and apparent publishers, Socket’s analysis revealed identical code structures, API patterns, and evasion techniques—indicating a coordinated operation by a single threat actor.

Attack techniques

The campaign deployed three distinct attack types working in concert:

DataByCloud Access (v1.6) extracts authentication cookies every 60 seconds:

Target platformDomain monitored
Workdaymyworkday.com
NetSuitenetsuite.com
SuccessFactorssuccessfactors.com
Process stepAction
1Background script monitors target domains
2Session cookies harvested every 60 seconds
3Cookies encrypted
4Exfiltrated to api[.]databycloud[.]com

Permissions requested:

PermissionAbuse potential
cookiesDirect cookie access
managementExtension control
scriptingPage injection
storageLocal data storage
declarativeNetRequestNetwork interception

2. DOM manipulation

Tool Access 11 (v1.4) blocks access to 44 administrative pages within Workday by erasing content and redirecting users to malformed URLs.

Data By Cloud 2 (v3.3) expands blocking to 56 pages, adding critical incident response functions.

Blocked functionalityImpact
MFA settingsCannot enable additional protection
SSO configurationCannot modify authentication
IP restrictionsCannot limit access by location
Session managementCannot terminate sessions
User provisioningCannot disable accounts
Role assignmentCannot modify permissions
Activity logsCannot review access history
Security audit reportsCannot investigate compromise
Password changesCannot reset credentials
Account deactivationCannot disable compromised accounts
2FA device managementCannot revoke compromised devices

This prevented administrators from detecting or remediating the compromise through normal administrative interfaces.

3. Session hijacking

Software Access goes beyond cookie theft—it also injects attacker-supplied cookies into victim browsers:

CapabilityImpact
Cookie injectionOverwrite legitimate sessions
Session takeoverAttacker assumes victim identity
Bidirectional controlBoth steal and inject cookies

This enables direct session takeover rather than requiring the attacker to use stolen cookies from a separate browser.

Enterprise impact

Stolen authentication cookies allow attackers to bypass MFA entirely. With valid session tokens, threat actors gain access to:

Data categoryExamplesRisk level
HR dataEmployee records, SSNs, addresses, salaryCritical
Financial dataNetSuite transactions, AP/AR, reportsCritical
PayrollDirect deposit details, tax withholdingCritical
Strategic dataWorkforce planning, compensation analysisHigh
Org chartsReporting structures, key personnelMedium

Organizations using these platforms typically house their most sensitive employee and financial data.

Why browser extension attacks work

Browser extensions operate with elevated privileges that make them attractive attack vectors:

FactorExploitation
Persistent accessRemain installed across browser sessions
Trusted contextRun within browser’s security boundary
Broad permissionsAccess cookies, modify DOM, intercept requests
Minimal vettingChrome Web Store review has known gaps
User trustEnterprise users assume “work tools” are safe
MFA bypassSession cookies work without additional authentication

Coordinated operation indicators

Socket identified evidence of a single threat actor:

IndicatorFinding
Code structureIdentical across extensions
API patternsSame C2 endpoints and protocols
Evasion techniquesShared security tool detection lists
Target platformsSame enterprise HR/ERP focus
InfrastructureCommon backend servers

Current status

ExtensionChrome Web StoreThird-party sites
DataByCloud 2RemovedStill on Softonic, others
Tool Access 11RemovedStill on Softonic, others
DataByCloud AccessRemovedStill on Softonic, others
Data By Cloud 1RemovedStill on Softonic, others
Software AccessStill activeAvailable

Critical: Users who installed before removal still have active malicious extensions. Removal from Chrome Web Store does not uninstall existing installations.

Recommendations

For security teams

PriorityAction
CriticalAudit installed extensions across organization
CriticalRemove identified malicious extensions
CriticalForce-remove extensions via Chrome Enterprise policy
HighBlock third-party extension sources
HighImplement extension allowlisting
HighMonitor for anomalous HR/ERP access patterns

Chrome Enterprise policy options

PolicyPurpose
ExtensionInstallBlocklistBlock specific extension IDs
ExtensionInstallAllowlistWhitelist approved extensions only
ExtensionInstallSourcesRestrict to managed deployments
ExtensionSettingsGranular per-extension control

For affected users

StepAction
1Check chrome://extensions for listed extension IDs
2Remove immediately if found
3Rotate passwords for Workday, NetSuite, SuccessFactors
4Review account activity for unauthorized access
5Report to IT security team
6Check for unexpected session activity

For platform administrators

PriorityAction
HighAudit authentication logs for simultaneous sessions
HighCheck for geographically inconsistent access
HighForce password resets from clean systems
HighReview trusted device registrations
MediumRemove unrecognized devices registered during attack window
OngoingMonitor for unusual administrative access patterns

Indicators of compromise

Extension IDs to block

lfjbffniigfppmjgljbijdohnnekpdae
dcdfcdigcalagpeoojgnaeaibphimepf
ohgbakjjcfcbkihohlklcfijlpbbjimc
fffijllacnghojlghnffhehloockfbak
knoedgofjnaekopeocjimgbbnhmjebgj

Publisher to flag

  • databycloud1104

C2 domain

  • api[.]databycloud[.]com

Context

This campaign reflects the growing trend of threat actors targeting enterprise SaaS platforms through browser-based attacks rather than traditional endpoint malware. As organizations move critical business functions to cloud platforms like Workday and NetSuite, the browser becomes the primary attack surface.

The combination of cookie theft for credential access, DOM manipulation to prevent remediation, and session injection for direct takeover represents a sophisticated multi-pronged attack against enterprise HR and financial systems.

Organizations should treat browser extension management with the same rigor applied to endpoint software deployment—implementing allowlisting, monitoring, and centralized policy enforcement. The 2,300+ affected users demonstrate that Chrome Web Store presence alone is not sufficient vetting for enterprise deployment.