You must log in or # to comment.
if it requires a malicious extension then that’s the attack vector. that’s nothing new.
Malicious browser extensions are truly not a new attack vector. What’s neat is how they managed to replicate the browser’s own UI.

