EvilChrome: Chrome Security Research PoC
The Concept
What if an attacker could replace a target’s Chrome browser binary with a malicious version that launches a Chrome instance controlled by an external program? This would give an attacker complete control over the user’s browsing activity while maintaining the appearance of a normal browser.
Technical Implementation
The PoC leverages several key components:
Binary Replacement
- Replaces the legitimate Chrome binary with a modified version
- Maintains all original Chrome functionality
- Seamlessly integrates with the system
Profile Loading
- Loads the user’s existing Chrome profile
- Maintains access to saved passwords, bookmarks, and history
- Creates a completely authentic browsing environment
Browser Control
- Uses Selenium for browser automation
- Implements real-time monitoring of all browser activities
- Captures form submissions, cookies, and session data
Stealth Operations
- Integrates the undetected-chromedriver library
- Bypasses common browser automation detection systems
- Appears as a legitimate browser instance
Security Implications
This research exposes several critical security concerns:
Profile Access
- Complete access to saved credentials
- Access to authentication tokens and cookies
- Ability to hijack existing sessions
Data Interception
- Real-time monitoring of form submissions
- Capture of sensitive input data
- Interception of authentication flows
Session Control
- Ability to maintain persistent access
- Manipulation of active sessions
- Cross-origin request capabilities
Mitigation Strategies
To protect against such attacks, organizations and users should:
- Implement strict binary verification
- Use hardware security modules where possible
- Monitor for unauthorized binary modifications
- Implement application allowlisting
- Conduct regular security audits of installed applications
Credits
This research uses the undetected-chromedriver library.
Disclaimer
This research is published for educational purposes only. The concepts and techniques described here should only be used in authorized security research and testing environments. Any malicious use of these concepts is strictly prohibited and may be illegal in your jurisdiction.
Enjoyed this post? Buy me a coffee ☕ to support my work.
Need a project done? Hire DevHive Studios 🐝