DataByCloud Campaign (malware extensions)

BLUF

 A highly targeted campaign utilizing five coordinated malicious Chrome extensions has emerged, specifically designed to impersonate enterprise HR and ERP utilities to facilitate session hijacking and complete account takeover in Workday, NetSuite, and SuccessFactors environments.

Executive Cost Summary

This cost analysis was developed by the CyberDax team using expert judgment and assisted analytical tools to support clarity and consistency.

 

For organizations affected by malicious browser extensions enabling ERP and HR session hijacking:

·       Low-end total cost: $750,000 – $1.5M

·       (Limited user exposure, rapid containment, no confirmed data misuse)

·       Typical expected range: $2M – $4.5M

·       (Multiple ERP users affected, operational disruption, compliance review required)

·       Upper-bound realistic scenarios: $5M – $9M

·       (Broad HR/finance access abuse, regulatory scrutiny, insurance impact)

 

Key Cost Drivers

·       Number of ERP and HR users with compromised browser sessions

·       Duration of undetected session hijacking activity

·       Scope of financial or payroll system access achieved

·       Regulatory classification of accessed employee or financial data

·       Cyber insurance exclusions related to identity and browser-based attacks

Targeted Sectors

·       Enterprise Finance

·       Human Resources

·       Corporate Administration.

Countries

·       Global

First Reported

·       January 15, 2026

Most Recent Update

·       January 16, 2026

APT names

·       No publicly named groups have been directly associated with this activity.

Criminal organization names

Unknown threat actor group utilizing the publisher

·       Databycloud1104 and Software Access

TTPs

·       T1566 Phishing

o   Adversaries use the Chrome Web Store and third-party software sites to host malicious extensions that masquerade as legitimate "premium tools" for enterprise platforms.

·       T1176 Browser Extensions

o   The primary delivery mechanism is the installation of malicious browser add-ons to achieve persistence and execute malicious code within the user's browser.

·       T1539 Steal Web Session Cookie

o   The extensions exfiltrate authentication cookies for targeted enterprise domains (e.g., SuccessFactors, NetSuite) to a remote server every 60 seconds.

·       T1550.004 Use Alternate Authentication Material: Web Session Cookie

o   Stolen cookies are used to facilitate session hijacking via cookie injection, allowing attackers to bypass multi-factor authentication (MFA) and access enterprise accounts.

·       T1056.002 Input Capture: GUI Input Capture

o   The malware manipulates the Document Object Model (DOM) tree to block security administration pages and potentially capture user interactions within the browser.

·       T1071.001 Application Layer Protocol: Web Protocols

o   The campaign utilizes standard HTTP/HTTPS traffic to communicate with its command-and-control (C2) infrastructure at api.databycloud[.]com.

·       T1020 Automated Exfiltration

o   The malicious extensions are configured to automatically transmit collected authentication data to the attacker's domain at regular intervals.

IOCs

Here is a list of the malicious extensions identified:

Extension Name

·       DataByCloud 1

Extension ID

·       mbjjeombjeklkbndcjgmfcdhfbjngcam

Extension Name

·       DataByCloud 2

Extension ID

·       makdmacamkifdldldlelollkkjnoiedg

Extension Name

·       DataByCloud Access

Extension ID

·       oldhjammhkghhahhhdcifmmlefibciph

Extension Name

·       Tool Access 11

Extension ID

·       ijapakghdgckgblfgjobhcfglebbkebf

Extension Name

·       Software Access

Extension ID

·       bmodapcihjhklpogdpblefpepjolaoij

Delivery Methods

·       Phishing emails and social engineering tactics are used to deliver these extensions, often impersonating legitimate HR or IT tools and promoting them as

o   Access Utilities

o   Productivity Boosters"

For ERP platforms like:

·       Workday

·       NetSuite

Malware Name

·       DataByCloud Stealer

Malware Family

·       Session Hijacker / Token Stealer

SHA256

·        30738450f69c3de74971368192a4a647e4ed9c658f076459e42683b110baf371

Verdict

·       Malicious (Critical)

Primary Objectives

·       Steal authentication tokens

·       Impede incident response

·       Facilitate account takeover.

Behavior Analysis

·       The extensions cooperate, with some potentially blocking security reporting and others exfiltrating cookies using the webRequest API.

ERP Vulnerability Context

The campaign exploits the trusted nature of cloud-based ERP systems. Relevant SAP patches from January 2026 include

CVE-2026-0498

CVSS 3.1

·       (9.1) AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Nessus ID

·       No Tenable plugin has been created for CVE-2026-0498 at this time

Is CVE-2026-0498 on the KEV list?

·       No

What is the CISA patch by date?

·       Not applicable

 

CVE-2026-0491

CVSS 3.1

·       (9.1) AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Nessus ID

·       No Tenable plugin has been created for CVE-2026-0491 at this time

Is CVE-2026-0498 on the KEV list?

·       No

What is the CISA patch by date?

·       Not applicable

Suggested Rules / potential hunts

As a reminder, these are indicator rules. They are likely to be noisy.

For best results consider creating a data model and reviewing the traffic as a report

Suricata

Detect command-and-control (C2) traffic to the identified malicious domains: api.databycloud.com and api.software-access.com.

C2 Traffic Alert

alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE DataByCloud Campaign C2 Domain Access"; flow:established,to_server; http.host; content:"api.databycloud.com"; classtype:trojan-activity; sid:1000001; rev:1;)

 

Cookie Exfiltration (POST activity)

alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE DataByCloud Exfiltration Activity (Bearer Token)"; flow:established,to_server; http.method; content:"POST"; http.header; content:"Authorization: Bearer "; content:"X-Version: "; classtype:trojan-activity; sid:1000002; rev:1;).

SentinelOne

Search for the installation and persistence of the specific extension IDs on Windows and macOS endpoints.

Hunt for Extension Installation (File Paths)

ObjectType = "File" AND (FilePath contains "mbjjeombjeklkbndcjgmfcdhfbjngcam" OR FilePath contains "makdmacamkifdldldlelollkkjnoiedg" OR FilePath contains "oldhjammhkghhahhhdcifmmlefibciph" OR FilePath contains "ijapakghdgckgblfgjobhcfglebbkebf" OR FilePath contains "bmodapcihjhklpogdpblefpepjolaoij")

 

Identify Browser Processes with Suspicious Permission Requests

ProcessName = "chrome.exe" AND Commandline contains "--load-extension" AND (Commandline contains "DataByCloud" OR Commandline contains "Software Access")

Splunk

Monitor for logs indicating the presence or installation of these extensions in an enterprise environment.

Hunt by Extension ID (Registry/File Logs)

index=main (source="*Google/Chrome/User Data/Default/Extensions*" OR source="*Microsoft/Edge/User Data/Default/Extensions*")

| search "mbjjeombjeklkbndcjgmfcdhfbjngcam" OR "makdmacamkifdldldlelollkkjnoiedg" OR "oldhjammhkghhahhhdcifmmlefibciph" OR "ijapakghdgckgblfgjobhcfglebbkebf" OR "bmodapcihjhklpogdpblefpepjolaoij"

 

Detect Blocking of Security Pages

Monitor for web traffic redirects or denied access to admin URLs like workday.com administrative paths.

index=proxy url="*workday.com*" (url="*security_policy*" OR url="*ip_range_management*") status=404 OR status=403

Email Samples

Subject

·       "Action Required: Update your Workday Access Tool"

Subject

·       "New NetSuite Productivity Add-on for DataByCloud Users"

Header Indicators

·       Suspicious X-Mailer headers suggesting automated sending and domains attempting to spoof databycloud[.]com

References

Socket Dev

·       hxxps://socket.dev/blog/5-malicious-chrome-extensions-enable-session-hijacking

NVD

·       hxxps://nvd.nist.gov/vuln/detail/CVE-2026-0498

·       hxxps://nvd.nist.gov/vuln/detail/CVE-2026-0491

VirusTotal

·       hxxps://www.virustotal.com/gui/file/30738450f69c3de74971368192a4a647e4ed9c658f076459e42683b110baf371

Previous
Previous

CVE-2026-0227 Critical DOS Vulnerability Palo Alto Networks PAN-OS

Next
Next

GootLoader Evasion via Massive ZIP Concatenation