A new Chrome browser botnet named “Cloud9” has been discovered in the wild using malicious extensions to steal online accounts, log keystrokes, inject ads and malicious JS code, and enlist the victim’s browser in DDoS attacks.
The Cloud9 Browser Botnet is actually a Remote Access Trojan (RAT) for the Chromium web browser, including Google Chrome and Microsoft Edge, allowing the threat author to execute commands remotely.
The malicious Chrome extension is not available on the official Chrome web store, but is instead distributed through alternative channels, such as websites that distribute fake Adobe Flash Player updates.

This method appears to be working well, as Zimperium researchers reported today that they have seen Cloud9 infections on systems around the world.
Infect your browser
Cloud9 is a malicious browser extension that hijacks Chromium browsers to perform a long list of malicious functions and capabilities.
The extension consists of three JavaScript files to collect system information, mine cryptocurrency using host resources, perform DDoS attacks, and inject scripts that execute browser exploits.
Zimperium has noticed exploits loading for CVE-2019-11708 and CVE-2019-9810 in Firefox, CVE-2014-6332 and CVE-2016-0189 for Internet Explorer, and CVE-2016-7200 for Edge.
These vulnerabilities are used to automatically install and execute Windows malware on the host, allowing attackers to further compromise the system.
However, even without the malicious Windows component, the Cloud9 extension can steal cookies from the compromised browser, which hackers can use to hijack valid user sessions and take control of accounts.

Additionally, the malware features a keylogger that can spy on key presses to steal passwords and other sensitive information.
A “clipper” module is also present in the extension, constantly monitoring the system clipboard for copied passwords or credit cards.

Cloud9 may also inject advertisements by silently loading web pages to generate ad impressions and, therefore, revenue for its operators.
Finally, the malware can draw on the host’s firepower to perform Layer 7 DDoS attacks via HTTP POST requests to the target domain.
“Layer 7 attacks are usually very difficult to detect because the TCP connection looks a lot like legitimate requests,” Zimperium comments.
“The developer is probably using this botnet to provide a service to perform DDOS.”
Operators and targets
The hackers behind Cloud9 are believed to have ties to the Keksec malware group, as the C2 domains used in the recent campaign have been seen in past Keksec attacks.
Keksec is responsible for developing and running several botnet projects, including EnemyBot, Tsunamy, Gafgyt, DarkHTTP, DarkIRC, and Necro.
Cloud9 victims are spread across the globe and screenshots posted by the threat actor on forums indicate that they target various browsers.

Additionally, public promotion of Cloud9 on cybercrime forums leads Zimperium to believe that Keksec is likely selling/renting it to other operators.
Update 11/9 – A Google spokesperson provided the following comment to BleepingComputer:
We always recommend users update to the latest version of Google Chrome to ensure they have the latest security protections.
Users can also stay better protected against malicious executables and websites by enabling Enhanced Protection in Chrome’s privacy and security settings.
Enhanced Protection automatically alerts you to potentially dangerous sites and downloads and inspects the security of your downloads and alerts you when a file may be dangerous.
#Malicious #extension #attackers #control #Google #Chrome #remotely