Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome Extension Compromises Facebook Business Security

Chrome Extension Compromises Facebook Business Security

Posted on February 17, 2026 By CWS

A newly identified Chrome extension is posing a significant threat to Facebook Business users by surreptitiously stealing two-factor authentication (2FA) codes and analytics data. This malicious tool, which presents itself as a utility for Meta Business operations, has been linked to potential account takeovers and data breaches.

Understanding the Malicious Extension

The extension, known as “CL Suite by @CLMasters” and identified by its ID: jkphinfhmfkckkcnifhjiplhfoiefffl, remains accessible in the Chrome Web Store and specifically targets Meta Business Suite and Facebook Business Manager environments. It promises to aid users by extracting data, analyzing business managers, and generating 2FA codes, while requesting extensive permissions over meta.com and facebook.com domains.

Despite its claims, a technical analysis by Socket AI Scanner reveals that the extension operates more like an infostealer rather than a productivity tool. It systematically misuses its advertised features to access authentication secrets and business intelligence from logged-in admin sessions.

How the Extension Exploits 2FA and Business Data

One of the most critical issues with the extension is its handling of 2FA for Facebook and Meta Business accounts. Users who rely on its built-in 2FA generator unknowingly allow CL Suite to capture their TOTP seed and current six-digit 2FA code. This information, alongside the associated Facebook username and email, is transmitted to an attacker-controlled infrastructure located at getauth[.]pro, with options for forwarding to a Telegram channel.

Armed with both the seed and a timestamped, valid code, attackers can indefinitely generate valid 2FA codes, facilitating account hijacking once passwords or recovery channels are compromised through infostealers or credential dumps.

Impact on Business Operations and Security Measures

Additionally, the extension aggressively targets Meta Business Manager data. It includes a feature for extracting the “People” view, compiling CSV files with details such as names, email addresses, roles, and access levels, and exfiltrating these files to the same backend, often for Telegram distribution.

Moreover, another analytics component catalogues Business Manager IDs, linked ad accounts, connected pages, and billing configurations, providing attackers a comprehensive map of business assets and funding mechanisms.

Recommended Actions for Businesses

Given its potential impact, organizations utilizing Meta Business or Facebook Business Manager should immediately audit their browser extensions, remove CL Suite, and consider affected accounts compromised. Recommended actions include re-enrolling 2FA with new secrets, reviewing Business Manager roles and members, and monitoring for traffic to getauth[.]pro and similar infrastructures.

For long-term security, enterprises should enforce extension allow-lists for admin browsers and rigorously evaluate any plugin offering scraping, verification bypass, or in-browser 2FA generation for high-value platforms.

Stay informed on the latest cybersecurity developments by following our updates on Google News, LinkedIn, and X. Contact us to feature your cybersecurity stories.

Cyber Security News Tags:2FA codes, account takeover, browser extension risk, business data, Chrome extension, Cybersecurity, data breach, Facebook security, InfoStealer, Meta Business

Post navigation

Previous Post: Password Managers at Risk: Vaults Susceptible to Attacks
Next Post: Langchain SSRF Vulnerability Threatens Internal Security

Related Posts

RubyGems Malware Attack Weaponizes 60+ Packages to Steal Credentials from Social Media and Marketing Tools RubyGems Malware Attack Weaponizes 60+ Packages to Steal Credentials from Social Media and Marketing Tools Cyber Security News
Deep Dive into Endpoint Security Deep Dive into Endpoint Security Cyber Security News
QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed Cyber Security News
ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats Cyber Security News
Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server Cyber Security News
Oracle Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack Oracle Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CRESCENTHARVEST Malware Targets Iran Protesters
  • Dell RecoverPoint Exploited by Chinese Hackers
  • CISA Highlights Four Actively Exploited Security Vulnerabilities
  • Critical Flaw in Windows Admin Center Enables Privilege Escalation
  • Matanbuchus 3.0 Emerges with Advanced Tactics to Deliver AstarionRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CRESCENTHARVEST Malware Targets Iran Protesters
  • Dell RecoverPoint Exploited by Chinese Hackers
  • CISA Highlights Four Actively Exploited Security Vulnerabilities
  • Critical Flaw in Windows Admin Center Enables Privilege Escalation
  • Matanbuchus 3.0 Emerges with Advanced Tactics to Deliver AstarionRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News