Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1189
Drive-by Compromise (via Web Store distribution).
T1059.007
Command and Scripting Interpreter: JavaScript.
T1539
Steal Web Session Cookie (Manipulation of CSRF tokens).
T1562.001
Impair Defenses: Disable or Modify Tools (Settings overrides).
CVE Profile
NVD Score: N/A (Feature Abuse) | CISA KEV
Status
Inactive.
Telemetry
Extension IDs
ceibjdigmfbbgcpkkdpmjokkokklodmc, mflibpdjoodmoppignjhciadahapkoch, lgakkahjfibfgmacigibnhcgepajgfdb, bndkfmmbidllaiccmpnbdonijmicaafn, pcdgkgbadeggbnodegejccjffnoakcoh.
File Size
Unknown (Not present in source telemetry).
String Literals
"'R-A-' + 843079 * 2" (Used to evade static string analysis), "vk.com/m0nda", "remixsec_redir".
C2 Architecture
The structure resembles a multi-stage dead-drop resolver. The extension fetches HTML metadata from hxxps://vk[.]com/m0nda, parses it for encoded payload locations (e.g., hxxps://2vk[.]github[.]io/-/), and executes the resulting GitHub-hosted payload in the user's browser.
Cookie Manipulation
The payload explicitly reads and manipulates the "remixsec_redir" cookie to bypass VK's Cross-Site Request Forgery (CSRF) protections, allowing unauthorized API calls.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
Note
As Google Chrome and VKontakte are not default Windows OS components, the threat to baseline enterprise infrastructure is assessed as
Theoretical/Low unless Chrome is actively deployed and users are permitted to install unapproved extensions.
GOVERN (GV) – Crisis Management & Oversight
Command
Update Acceptable Use Policies (AUP) to explicitly prohibit the installation of unauthorized browser extensions on corporate assets.
Command
Establish a software supply chain review board for browser extensions.
DETECT (DE) – Monitoring & Analysis
Command
Query EDR/RMM telemetry for the presence of the identified Extension IDs (e.g., ceibjdigmfbbgcpkkdpmjokkokklodmc) across the fleet.
Command
Monitor web proxy logs for anomalous traffic reaching hxxps://2vk[.]github[.]io or hxxps://an[.]yandex[.]ru/system/context.js originating from non-developer subnets.
RESPOND (RS) – Mitigation & Containment
Command
Push Group Policy Objects (GPO) or MDM profiles to forcibly remove the malicious Extension IDs and blocklist them via Chrome Enterprise policies.
Command
Isolate any endpoints showing active C2 beaconing to the GitHub dead-drop repository.
RECOVER (RC) – Restoration & Trust
Command
Invalidate and force-reset all active web session tokens (specifically targeting VKontakte if used for corporate communications).
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Implement Chrome Enterprise ExtensionAllowlist policies, moving from a default-allow to a default-deny posture for all browser extensions.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority Constraint
Disconnection from the internet is NOT required as this is an application-layer (browser) threat, not a system-level worm or ransomware.
Priority 1: Safety
Command
Do not log into banking, email, or social media accounts on the affected browser until the extension is removed.
Command
Open Google Chrome, navigate to chrome://extensions/, and immediately "Remove" any extensions named "VK Styles" or matching the IDs listed in the telemetry above.
Priority 2: Identity
Command
Using a known clean device (or the cleaned browser), log into VKontakte.
Command
Navigate to VK settings, manually revert any forced configuration changes (e.g., feed sorting), and unsubscribe from unauthorized groups (specifically Group ID -168874636 / "VK Styles").
Command
Terminate all active web sessions within VKontakte security settings to invalidate the stolen "remixsec_redir" CSRF tokens.
Priority 3: Persistence
Command
Clear all browser cookies and cache (Time range: "All time") to ensure no residual malicious scripts or manipulated tokens remain.
Hardening & References
Baseline
CIS Benchmarks for Google Chrome (v130+).
Framework
NIST CSF 2.0 / SP 800-61r3.
Guidance
To mitigate runtime evaluation evasion (e.g., "'R-A-' + 843079 * 2"), prioritize behavioral endpoint monitoring over static string analysis. Enforce strict Content Security Policies (CSP) and Extension Manifest V3 compliance to limit an extension's ability to execute remotely hosted code.
Source
Koi.ai