Skip to content

Details

What does a trojan look like when it has over 900k+ combined installs and a Forbes write-up? Exactly like a legitimate Chrome extension.
This session presents a technical dissection of two Chrome extensions, each with over one million active installations — that functioned as trojans in production environments, evading detection while operating through entirely legitimate browser APIs. These were not obscure tools. They were widely trusted, actively recommended, and covered by mainstream press before their malicious behavior was fully understood. We will walk through the actual source code of both extensions, showing precisely how the malicious functionality was constructed, concealed, and executed at scale.
This analysis anchors a broader examination of how modern compromises actually succeed. Drawing on aggregated real-world incident data, we identify the technique categories currently delivering the highest adversary return, and why they keep working. Spoiler: it's rarely a zero-day. It's trust.
The Chrome extension deep-dive will cover:

  • Line-by-line source analysis of how malicious functionality was embedded within working, useful software
  • Which browser permission scopes were abused, and why a million users — and their IT teams — didn't see it coming
  • The behavioral and structural indicators that distinguish a trojan extension from a legitimate one, and how to operationalize detection around them

This session closes with a practical defensive prioritization framework built around observed attacker behavior: which mitigations are measurably reducing risk in production environments, which are consuming budget without impact, and a scoring methodology your team and leadership can apply immediately.
Source material: Primary analysis of extension source code, corroborated by reporting from Forbes and other established outlets.
What this is not: A vendor pitch, a speculative threat narrative, or a surface-level breach retrospective.
Who should attend: Security architects, AppSec and cloud security practitioners, blue team leads, threat hunters, browser security practitioners, and security leaders responsible for prioritizing risk and investment decisions.

Related topics

Events in Nashville, TN, TN
Cybersecurity
OWASP

Sponsors

Asurion

Asurion

Event space

Brinqa

Brinqa

Food and speaker

Zenity

Zenity

Food and speaker

Security Journey

Security Journey

Secure Coding Game

You may also like