Fake Bitwarden ads on Facebook push info-stealing Chrome extension

by · BleepingComputer

Fake Bitwarden password manager advertisements on Facebook are pushing a malicious Google Chrome extension that collects and steals sensitive user data from the browser.

Bitwarden is a popular password manager app with a "free" tier featuring end-to-end encryption, cross-platform support, MFA integration, and a user-friendly interface.

Its user base has been growing steadily in the past couple of years, especially following security breaches of competitors that led many to look for alternatives.

A new malvertising campaign impersonating Bitwarden was spotted by Bitdefender Labs, whose researchers report that the operation launched on November 3, 2024.

Multiple ads of the same campaign
Source: Bitdefender

Malicious Facebook advertisements

The Facebook advertising campaign warns users that they're "using an outdated version of Bitwarden," and need to update the program immediately to secure their passwords.

The link included in the ad is 'chromewebstoredownload[.]com,' which pretends to be Google's official Chrome Web Store at 'chromewebstore.google.com.'

The landing page also features a design closely resembling the Chrome Web Store, including an 'Add to Chrome' button.

Malicious website mimicking the real Google web store
Source: Bitdefender

However, instead of the extension automatically installing when you click the link, visitors are prompted to download a ZIP file from a Google Drive folder.

Though this should be a clear sign of danger, users unfamiliar with the Chrome Web Store may proceed with the manual installation, following the instructions on the webpage.

The installation requires enabling 'Developer Mode' on Chrome and manually sideloading the extension on the program, so essentially, security checks are bypassed.

Once installed, the extension registers as 'Bitwarden Password Manager' version 0.0.1 and secures permissions that enable it to intercept and manipulate user activities.

Its main functions are the following:

  • Collect Facebook cookies, particularly the 'c_user' cookie containing the user ID.
  • Gather IP and geolocation data using public APIs
  • Collect Facebook user details, account information, and billing data through Facebook's Graph API
  • Manipulates browser DOM to display fake loading messages for legitimacy or deception.
  • Encodes sensitive data and transmits it to a Google Script URL under the attackers' control.

To mitigate this risk, Bitwarden users are advised to ignore ads prompting extension updates, as Chrome extensions are automatically updated when the vendor releases a new version.

Extensions should only be installed via Google's official web store or by following links from the project's official website, in this case, bitwarden.com.

When installing a new extension, always check the requested permissions and treat overly aggressive requests involving access to cookies, network requests, and website data with high suspicion.