Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ShadyPanda’s 7-Year Campaign Infects 4.3M Chrome and Edge Users
News

ShadyPanda’s 7-Year Campaign Infects 4.3M Chrome and Edge Users

Team-CWDBy Team-CWDDecember 2, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A seven-year browser extension campaign has infected 4.3 million Chrome and Edge users.

The group responsible, tracked as ShadyPanda, has been observed leveraging trusted browser marketplaces to build user bases, operate legitimately for years, then quietly deploy malicious updates.

A new Koi Security report identified a remote code execution backdoor affecting 300,000 users across five extensions, including Clean Master.

These extensions had operated normally since 2018, until a mid-2024 update enabled hourly downloads of arbitrary JavaScript. The malware logged website visits, exfiltrated encrypted browsing histories and gathered full browser fingerprints.

Meanwhile, a parallel spyware operation reached more than 4 million users through five additional Microsoft Edge extensions, most notably WeTab, which alone accounted for 3 million installs.

These extensions collected every URL visited, search term, mouse click and various browser identifiers, with traffic routed to servers in China.

Origins and Longevity Strategies

ShadyPanda’s earliest efforts date back to 2023, when the threat actor launched 145 browser extensions masquerading as wallpaper or productivity tools.

These add-ons injected affiliate codes on several shopping sites and used Google Analytics to profile user behavior. Koi researchers said the campaign revealed three lessons ShadyPanda would later exploit:

  • Limited post-approval monitoring

  • High trust in extensions with strong install counts

  • Advantages gained through long-term legitimacy

Read more on browser extension security: Researchers Reveal 18 Malicious Chrome and Edge Extensions Disguised as Everyday Tools 

By early 2024, the group shifted toward aggressive browser manipulation. One extension, Infinity V+, redirected searches through a known hijacker, harvested cookies, and transmitted keystrokes to external servers.

Although many of these extensions were removed within weeks, ShadyPanda kept on developing its attack strategies.

Koi researchers attribute ShadyPanda’s longevity to a consistent gap in extension review processes.

“ShadyPanda proved that marketplaces still review extensions the same way they did seven years ago – static analysis at submission, trust after approval, no ongoing monitoring. Clean Master operated legitimately for five years. Static analysis wouldn’t catch this.” 

To defend against similar threats, individuals are advised to routinely audit installed browser extensions, remove tools they no longer use and favor developers with transparent update histories.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMatrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Next Article China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What’s at stake if your employees post too much online

December 1, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.