Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

March 26, 2026

Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code

March 26, 2026

Claude Code Security and Magecart: Getting the Threat Model Right

March 26, 2026
Facebook X (Twitter) Instagram
Friday, March 27
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Experts Sound Alarm Over “Prompt Poaching” Browser Extensions
News

Experts Sound Alarm Over “Prompt Poaching” Browser Extensions

Team-CWDBy Team-CWDMarch 26, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security experts have warned users to beware of malicious Chrome extensions designed to secretly monitor and exfiltrate users’ AI conversations.

Expel explained in a blog post, published on March 24, that it had observed “several dozen” incidents in the past month of so-called “prompt poaching” by legitimate-looking extensions.

“The functionality is fairly straightforward – the browser extension monitors open tabs, and upon seeing an AI client loaded, will monitor for and collect questions and answers using API interception or DOM scraping,” it said.

“The extension will then package them up and send them to an external server run by the browser extension’s developers.”

Read more on malicious browser extensions: Malicious Google Chrome Extensions Hijack Workday and Netsuite.

There appear to be two main ways that scammers trick their victims.

The first is to impersonate legitimate extensions, such as “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” and “Talk to ChatGPT” from developer AITOPIA. A report from December last year claimed that two of these malicious extensions had accrued as many as 900,000 unwitting users.

A second tactic is to develop and market a legitimate extension, and then insert malicious functionality once the user base has grown large enough. This is the case with the “Urban VPN Proxy” tool spotted by Expel.

How to Minimize Prompt Poaching Risks

The security vendor urged businesses to prohibit the downloading of AI-related browser extensions and ensure employee use of extensions in general is centrally managed.

“It almost goes without saying that these plugins open the doors to several risks, including identity theft, targeted phishing campaigns, and sensitive data being put up for sale on underground forums,” Expel warned.

“In the case of organizations where employees may have unwittingly installed these extensions, they may have exposed intellectual property, customer data, or other confidential information.”

Expel recommended the following:

  • Suggest approved alternatives to reduce the likelihood of users installing potentially dangerous extensions
  • Review extension permissions before installation and beware of any that request permissions beyond advertised functionality
  • Manage extensions using group policy or browser management consoles, limiting use to those which have been reviewed and approved
  • Run periodic audits to understand usage and monitor browser processes for any tools that connect to unknown domains



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE
Next Article Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS
Team-CWD
  • Website

Related Posts

News

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

March 26, 2026
News

Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code

March 26, 2026
News

Claude Code Security and Magecart: Getting the Threat Model Right

March 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

In memoriam: David Harley

November 12, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.