January 23, 2026
By esentry Team

HR Takeover by Chrome

At first glance, it looked harmless.

A Chrome extension promising productivity.
Another claiming to streamline HR workflows.
A browser add-on marketed as “helpful,” “secure,” and “enterprise ready.”

These extensions were quietly turning Chrome into a session-hijacking weapon, giving attackers access to some of the most sensitive systems inside organizations: HR and ERP platforms.

What Actually Happened

Security researchers recently uncovered multiple malicious Chrome extensions hosted on the official Chrome Web Store. These extensions posed as legitimate HR-related tools but were engineered for one purpose: stealing authenticated enterprise sessions.

Once installed, they didn’t need passwords.

They didn’t need MFA prompts.

They didn’t trigger obvious alerts.

They simply waited for users to log in to platforms like Workday, SAP SuccessFactors, or NetSuite and then quietly copied the session cookies that proved the user was already trusted.

From there, attackers could replay those sessions and walk straight into enterprise systems as legitimate employees.

Why HR Became the Target

HR systems are not just administrative tools; they are identity hubs.

They contain:

·      Employee personal and financial data

·      Payroll and banking details

·      Role assignments and approval workflows

·      Access paths to other internal systems

Compromise HR, and you don’t just steal data, you reshape trust inside the organization.

Attackers understand this. And instead of attacking the platform directly, they attacked the browser sitting between the employee and the system.

How the Extensions Operated

The attack was subtle, deliberate, and effective through:

Session hijacking: Extensions harvested authentication cookies and sent them to attacker-controlled servers, enabling account takeover without credentials.

Security interference: Some extensions blocked access to password, MFA, or account settings pages, slowing down detection and response.

Legitimate disguise: They requested permissions that didn’t immediately raise red flags and blended into normal browser behavior.

This wasn’t malware screaming for attention.

It was malware pretending to be helpful.

The Bigger Picture

Attackers aren’t breaking into systems.

They’re logging in.

They’re abusing trusted sessions, trusted users, and trusted tools by turning everyday productivity software into an attack surface.

And HR, often less locked down than security or IT systems, is becoming a prime entry point.

What Organizations Should Do Now

This isn’t about banning Chrome. It’s about controlling it.

Audit installed browser extensions across the organization

Enforce strict allow-listing for extensions via enterprisepolicies

Reset sessions and credentials for affected users

Monitor HR and ERP platforms for unusual session behaviour

Most importantly, treat browser extensions as softwaresupply-chain risk, not convenience features.

This is a reminder that in modern enterprises, the quietest attacks don’t kick down doors, they sit patiently in your toolbar.