You must log in or register to comment.
- if it requires a malicious extension then that’s the attack vector. that’s nothing new. - Malicious browser extensions are truly not a new attack vector. What’s neat is how they managed to replicate the browser’s own UI. 
 

