Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Pro-Russia Hackers Target US Critical Infrastructure in New Wave

December 11, 2025

Iran-Linked Hackers Hit Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 10, 2025

ClickFix Social Engineering Sparks Rise of CastleLoader Attacks

December 10, 2025
Facebook X (Twitter) Instagram
Thursday, December 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware
News

ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware

Team-CWDBy Team-CWDDecember 10, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A threat actor known as ShadyPanda has been linked to a seven-year-long browser extension campaign that has amassed over 4.3 million installations over time.

Five of these extensions started off as legitimate programs before malicious changes were introduced in mid-2024, according to a report from Koi Security, attracting 300,000 installs. These extensions have since been taken down.

“These extensions now run hourly remote code execution – downloading and executing arbitrary JavaScript with full browser access,” security researcher Tuval Admoni said in a report shared with The Hacker News. “They monitor every website visit, exfiltrate encrypted browsing history, and collect complete browser fingerprints.”

To make matters worse, one of the extensions, Clean Master, was featured and verified by Google at one point. This trust-building exercise allowed the attackers to expand their user base and silently issue malicious updates years later without attracting any suspicion.

Meanwhile, another set of five add-ons from the same publisher is designed to keep tabs on every URL visited by its users, as well as record search engine queries and mouse clicks, and transmit the information to servers located in China. These extensions have been installed about four million times, with WeTab alone accounting for three million installs.

Early signs of malicious activity were said to have been observed in 2023, when 20 extensions on the Chrome Web Store and 125 extensions on Microsoft Edge were published by developers named “nuggetsno15” and “rocket Zhang,” respectively. All the identified extensions masqueraded as wallpaper or productivity apps.

These extensions were found to engage in affiliate fraud by stealthily injecting tracking codes when users visited eBay, Booking.com, or Amazon to generate illicit commissions from users’ purchases. In early 2024, the attack shifted from seemingly harmless injections to active browser control through search query redirection, search query harvesting, and exfiltration of cookies from specific domains.

“Every web search was redirected through trovi.com – a known browser hijacker,” Koi said. “Search queries logged, monetized, and sold. Search results manipulated for profit.”

At some point in mid-2024, five extensions, three of which had been operating legitimately for years, were modified to distribute a malicious update that introduced backdoor-like functionality by checking the domain “api.extensionplay[.]com” once every hour to retrieve a JavaScript payload and execute it.

The payload, for its part, is designed to monitor every website visit and send the data in encrypted format to a ShadyPanda server (“api.cleanmasters[.]store”), along with a detailed browser fingerprint. Besides using extensive obfuscation to conceal the functionality, any attempt to access the browser’s developer tools causes it to switch to benign behavior.

Furthermore, the extensions can stage adversary-in-the-middle (AitM) attacks to facilitate credential theft, session hijacking, and arbitrary code injection into any website.

The activity moved to the final stage when five other extensions published around 2023 to the Microsoft Edge Addons hub, including WeTab, leveraged its huge install base to enable comprehensive surveillance, including gathering every URL visited, search queries, mouse clicks, cookies, and browser fingerprints.

They also come fitted with capabilities to collect information about how a victim interacts with a web page, such as the time spent viewing it and scrolling behavior. The WeTab extension is still available for download as of writing.

Cybersecurity

The findings paint the picture of a sustained campaign that transpired over four distinct phases, progressively turning the browser extensions from a legitimate tool into data-gathering spyware. However, it bears noting that it’s not clear if the attackers artificially inflated the downloads to lend them an illusion of legitimacy.

Users who installed the extensions are recommended to remove them immediately and rotate their credentials out of an abundance of caution. Some of the identified extensions on Chrome and Edge are listed below –

  • Clean Master: the best Chrome Cache Cleaner
  • Speedtest Pro-Free Online Internet Speed Test
  • BlockSite
  • Address bar search engine switcher
  • SafeSwift New Tab
  • Infinity V+ New Tab
  • OneTab Plus:Tab Manage & Productivity
  • WeTab 新标签页
  • Infinity New Tab for Mobile
  • Infinity New Tab (Pro)
  • Infinity New Tab
  • Dream Afar New Tab
  • Download Manager Pro
  • Galaxy Theme Wallpaper HD 4k HomePage
  • Halo 4K Wallpaper HD HomePage

“The auto-update mechanism – designed to keep users secure – became the attack vector,” Koi said. “Chrome and Edge’s trusted update pipeline silently delivered malware to users. No phishing. No social engineering. Just trusted extensions with quiet version bumps that turned productivity tools into surveillance platforms.”

“ShadyPanda’s success isn’t just about technical sophistication. It’s about systematically exploiting the same vulnerability for seven years: Marketplaces review extensions at submission. They don’t watch what happens after approval.”

Update

The WeTab extension is no longer available for download from the Microsoft Edge add-ons marketplace.

A Microsoft spokesperson shared the following statement with The Hacker News following the publication of the story: “We have removed all the extensions identified as malicious on the Edge Add-on store. When we become aware of instances that violate our policies, we take appropriate action that includes, but is not limited to, the removal of prohibited content or termination of our publishing agreement.”

The company has also recommended that users update Edge to the latest version, remove any extensions they don’t recognize or need, review extension permissions, and keep only trusted publishers. Enterprise administrators are advised to enforce extension policies, audit installed extensions, and use allow‑lists/blocked‑lists as appropriate.

(The story was updated after publication to include a response from Microsoft.)



Source

computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates data breach hacker news hacking news how to hack information security network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
Next Article Malicious VS Code Extensions Deploy Advanced Infostealer
Team-CWD
  • Website

Related Posts

News

Iran-Linked Hackers Hit Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 10, 2025
News

ClickFix Social Engineering Sparks Rise of CastleLoader Attacks

December 10, 2025
News

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

December 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

How cybercriminals are targeting content creators

November 26, 2025

AI-powered financial scams swamp social media

September 11, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.