Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Malicious Chrome Extension 'CL Suite' Steals Meta Business
Malicious Chrome Extension 'CL Suite' Steals Meta Business
NEWS

Malicious Chrome Extension 'CL Suite' Steals Meta Business

Security researchers have uncovered a malicious Chrome extension called CL Suite that steals TOTP 2FA seeds, Meta Business Manager data, and analytics,...

Dylan H.

News Desk

February 13, 2026
3 min read

Chrome Extension Targets Meta Business Accounts

Security researchers have discovered a malicious Chrome extension called "CL Suite" that specifically targets Meta Business Manager users, stealing TOTP two-factor authentication seeds, business analytics data, and personnel information — effectively neutralizing 2FA protections entirely.


Attack Overview

AttributeDetails
Extension NameCL Suite
TargetMeta Business Manager users
Data StolenTOTP 2FA seeds/codes, Business "People" CSV exports, Business Manager analytics
Exfiltration Endpointsgetauth[.]pro, Telegram channel
ImpactComplete 2FA bypass, business account takeover

How It Works

TOTP 2FA Seed Theft

The most dangerous capability is intercepting TOTP seeds during 2FA setup or re-authentication:

  1. The extension monitors page content for TOTP seed values
  2. Intercepts QR code data or secret key during setup
  3. Exfiltrates the seed to attacker infrastructure

With the TOTP seed, attackers can generate valid 2FA codes at will, completely bypassing two-factor authentication.

Meta Business Data Harvesting

Beyond 2FA theft, the extension harvests:

  • People CSV exports — Employee names, roles, emails, permission levels
  • Business Manager analytics — Ad spend, campaign performance, audience insights, revenue data

Exfiltration

All stolen data is sent to:

  1. getauth[.]pro — Purpose-built C2 domain for 2FA seeds and business data
  2. Telegram channel — Real-time attacker notifications when new data is captured

Why This Is Dangerous

Meta Business Manager accounts often control large advertising budgets (sometimes millions of dollars), company pages with significant followings, and customer data from lead generation campaigns. Account takeover can lead to unauthorized ad spend, brand damage, and data breaches.

Software-based TOTP is vulnerable when the seed can be intercepted at the browser level — this extension demonstrates that browser extensions operate at a privileged level that can observe and modify any web page content.


Protection Recommendations

  1. Audit Chrome extensions — Review all installed extensions in chrome://extensions
  2. Use hardware security keys — FIDO2/WebAuthn keys (YubiKey, Titan Key) are immune to seed theft
  3. Implement extension allowlisting via Chrome enterprise policies
  4. Rotate 2FA seeds — If you suspect compromise, disable and re-enable 2FA
  5. Review Meta Business access — Check the "People" section for unauthorized users
  6. Separate browsing profiles — Use a dedicated profile for business account management
  7. Monitor network traffic — Block connections to getauth[.]pro

Sources

  • The Hacker News — Malicious Chrome Extension Steals Meta Business Data
  • Socket.dev — CL Suite Chrome Extension Analysis

Related Reading

  • Claude AI Artifacts Abused to Distribute macOS Infostealer
  • PromptSpy: First Android Malware to Weaponize Generative AI
  • Google Disrupts Massive Chinese Espionage Campaign
#Malware#Chrome Extension#Meta#2FA#Social Engineering#Browser Security

Related Articles

Claude AI Artifacts Abused to Distribute macOS Infostealer

Threat actors are abusing publicly shared Claude AI artifacts and Google Ads to deliver the MacSync infostealer to macOS users through ClickFix social...

3 min read

Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio

Threat actors known as TeamPCP compromised the Telnyx Python package on PyPI, uploading malicious versions that conceal credential-stealing malware inside a WAV audio file using steganographic techniques.

4 min read

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

A newly observed ClickFix campaign impersonates Cloudflare's CAPTCHA verification pages to deliver the Python-based Infiniti Stealer to macOS users via a multi-stage chain involving a Bash script and a Nuitka-compiled loader.

4 min read
Back to all News