Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Spot Surge in Brute-Force Attacks from Middle East

April 15, 2026

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

April 15, 2026

Malicious Chrome Extensions Campaign Exposes User Data

April 15, 2026
Facebook X (Twitter) Instagram
Wednesday, April 15
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Malicious Chrome Extensions Campaign Exposes User Data
Cyber Security

Malicious Chrome Extensions Campaign Exposes User Data

Team-CWDBy Team-CWDApril 15, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A large-scale campaign involving 108 malicious Chrome extensions has been uncovered, affecting roughly 20,000 users.

The extensions, spread across categories such as gaming, social media tools and translation utilities, appear legitimate but secretly collect sensitive data. All are linked to a single command-and-control (C2) infrastructure to enable operators to aggregate stolen information in one place.

The campaign, identified by security researchers at Socket, stands out for its breadth and coordination. Although published under five separate developer identities, the team found consistent backend systems and shared operational patterns across all extensions.

Several Attack Techniques

The research highlighted several distinct attack techniques deployed simultaneously. Among the most serious is a Telegram-focused extension that captures active web sessions every 15 seconds, allowing full account access without passwords or multi-factor authentication (MFA).

Other extensions harvest Google account details using OAuth2 permissions, inject ads by bypassing browser security protections or open arbitrary web pages through hidden backdoors. Many operate continuously in the background, even if users never actively interact with them.

Key behaviors identified include:

  • 54 extensions collecting Google profile data

  • 45 extensions containing a persistent backdoor triggered at browser start-up

  • Multiple tools injecting scripts or ads into popular platforms like YouTube and TikTok

  • One extension acting as a translation proxy through attacker-controlled servers

Dual Behavior Complicates Detection

According to Socket, the extensions often deliver on their advertised functionality, such as games or messaging tools, while masking malicious activity running in the background. This dual behavior makes detection difficult for users.

Read more on browser extension security risks: Experts Sound Alarm Over “Prompt Poaching” Browser Extensions

The infrastructure also supports a Malware-as-a-Service (MaaS) model, where stolen data and active sessions can be accessed by third parties. Researchers linked the entire operation to a single operator through shared cloud resources, reused code and overlapping account identifiers.

All 108 extensions were still available at the time of discovery. The appropriate security teams have been notified, and takedown requests have been submitted.

Infosecurity contacted Google for comment, but has not yet received a response. 

Image credit: Mijansk786 / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTriad Nexus Expands Global Fraud Operations Despite US Sanctions
Next Article Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
Team-CWD
  • Website

Related Posts

Cyber Security

Microsoft 365 Tenant Security: How to Stay in Control of Your Data

April 10, 2026
Cyber Security

Google API Keys Quietly Gain Access to Gemini on Android Devices

April 9, 2026
Cyber Security

GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltrati

April 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Find your weak spots before attackers do

November 21, 2025

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.