Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
GoPlus: How to prevent browser plug-in hijacking

GoPlus: How to prevent browser plug-in hijacking

BlockBeats2024/06/03 12:43
By:BlockBeats

Recently, a Twitter user had his browser cookies hijacked due to the installation of the Aggr plug-in in the Chrome browser, resulting in asset losses of more than 1 million US dollars


GoPlus: How to prevent browser plug-in hijacking image 0


The essence of a browser plug-in (extension) is that the user entrusts the plug-in to process part of the web page information on their behalf, but in fact, it can not only access and modify the original web page information, but also obtain positioning, read/modify the clipboard, read Cookies/history, screenshots, and keyboard records, etc. In other words, these plug-ins can not only obtain information such as Cookies, but also directly determine what the web page we see is like.


Web-based attacks in the browser are basically unrecognizable by the system security mechanism, and the browser cannot recognize whether the access of the plug-in is allowed by the user, so in theory, browser plug-ins are more difficult to identify than the attack behavior of client software.


The GoPlus security team recommends that users improve their security awareness and use browser plug-ins safely by referring to the following methods:


1. Do not use plug-ins (extensions) from unknown sources, and only download plug-ins from the official market.


2. Even official plug-ins may be tampered with by hackers, such as directly replacing the installation package or supply chain attacks. During use, you must pay attention to controlling access rights, not granting unnecessary permissions, and not reading/changing website data on all websites by default. Setting plug-in permissions to [When you click this extension] or [On a specific website] can effectively prevent malicious extensions from obtaining cookies. The steps are as follows:


GoPlus: How to prevent browser plug-in hijacking image 1


3. Isolate the plug-in browser and the transaction funds browser.


4. Try not to use the web page to log in to the exchange, use incognito browsing for sensitive operations, log out immediately when not using the trading page, and regularly clear browser cache and cookies and other information.



欢迎加入律动 BlockBeats 官方社群:

Telegram 订阅群: https://t.me/theblockbeats

Telegram 交流群: https://t.me/BlockBeats_App

Twitter 官方账号: https://twitter.com/BlockBeatsAsia

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like