Fake AI Assistant Extensions in Google Chrome Web Store Exfiltrate Credentials and Monitor Emails
Summary
Hide ▲
Show ▼
Over 260,000 Google Chrome users downloaded fake AI assistant extensions that steal login credentials, monitor emails, and enable remote access. Researchers at LayerX identified over 30 malicious extensions as part of a coordinated campaign called AiFrame. The extensions mimicked popular AI assistants like Claude AI, ChatGPT, Grok, and Google Gemini. The campaign used extension spraying to evade takedowns, directing users to remote infrastructure to avoid detection. The extensions exfiltrate data from Chrome and Gmail to attacker-controlled servers. LayerX warns that these extensions act as general-purpose access brokers, capable of harvesting data and monitoring user behavior. Many extensions have been removed from the Chrome Web Store, but users who downloaded them remain at risk. Additionally, cybersecurity researchers have discovered a malicious Google Chrome extension named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl) that steals TOTP codes for Facebook and Meta Business accounts, Business Manager contact lists, and analytics data. The extension exfiltrates data to infrastructure controlled by the threat actor, including a backend at getauth[.]pro and a Telegram channel. The extension has 33 users as of writing and was first uploaded to the Chrome Web Store on March 1, 2025. About 500,000 VKontakte users have had their accounts silently hijacked through Chrome extensions masquerading as VK customization tools. The large-scale campaign has been codenamed VK Styles. The malware embedded in the extensions is designed to engage in active account manipulation by automatically subscribing users to the attacker's VK groups, resetting account settings every 30 days to override user preferences, manipulating CSRF tokens to bypass VK's security protections, and maintaining persistent control. A report published by Q Continuum found a huge collection of 287 Chrome extensions that exfiltrate browsing history to data brokers. These extensions have 37.4 million installations, representing roughly 1% of the global Chrome userbase.
Timeline
-
13.02.2026 13:25 3 articles · 4d ago
Fake AI Assistant Extensions in Google Chrome Web Store Exfiltrate Credentials and Monitor Emails
Over 260,000 Google Chrome users downloaded fake AI assistant extensions that steal login credentials, monitor emails, and enable remote access. Researchers at LayerX identified over 30 malicious extensions as part of a coordinated campaign called AiFrame. The extensions mimicked popular AI assistants like Claude AI, ChatGPT, Grok, and Google Gemini. The campaign used extension spraying to evade takedowns, directing users to remote infrastructure to avoid detection. The extensions exfiltrate data from Chrome and Gmail to attacker-controlled servers. LayerX warns that these extensions act as general-purpose access brokers, capable of harvesting data and monitoring user behavior. Many extensions have been removed from the Chrome Web Store, but users who downloaded them remain at risk. The extensions render a full-screen iframe overlay pointing to a remote domain ("claude.tapnetic[.]pro"), allowing the attackers to remotely introduce new capabilities without requiring a Chrome Web Store update. When instructed by the iframe, the add-ons query the active browser tab and invoke a content script to extract readable article content using Mozilla's Readability library. The malware also supports the capability to start speech recognition and exfiltrate the resulting transcript to the remote page. A smaller set of the extensions contain functionality to specifically target Gmail by reading visible email content directly from the document object model (DOM) when a victim visits mail.google[.]com. When Gmail-related features such as AI-assisted replies or summaries are invoked, the extracted email content is passed into the extension's logic and transmitted to third-party backend infrastructure controlled by the extension operator. LayerX security researcher Natalie Zargarov highlights that the extensions leverage brand association and users' familiarity with well-known model names. The extensions use a full-screen iframe pointing to an attacker-controlled domain, overlaid onto the current page in the victim's browser. The attacker's server captures sensitive information fed into the extensions, which might proxy a real large language model's (LLM) API. The extensions can read page content, transmit it to attacker-controlled servers, and return a summary, potentially retaining the full dataset remotely. The extensions can exfiltrate customer data, trade secrets, and regulated data outside corporate controls. The extensions can appear compliant during review, with clean metadata, limited local code, and no obvious red flags in static analysis. Google may not be deeply analyzing network endpoints, shared TLS certificates, reused hosting providers, and identical JavaScript bundles loaded remotely. Some of the extensions remain available on the Chrome Web Store more than 24 hours after LayerX published its blog post.
Show sources
- Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails — www.infosecurity-magazine.com — 13.02.2026 13:25
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
13.02.2026 13:25 1 articles · 4d ago
Malicious Chrome Extension CL Suite Steals TOTP Codes and Business Data
The extension CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl) steals TOTP codes for Facebook and Meta Business accounts, Business Manager contact lists, and analytics data. The extension exfiltrates data to infrastructure controlled by the threat actor, including a backend at getauth[.]pro and a Telegram channel. The extension has 33 users as of writing and was first uploaded to the Chrome Web Store on March 1, 2025. The extension does not have capabilities to steal password-related information but can be used to gain unauthorized access to victims' accounts. The extension targets users of Meta Business Suite and Facebook Business Manager, leveraging the extension to conduct data collection and exfiltration without users' knowledge or consent. The extension gives the threat actor enough information to identify high-value targets and mount follow-on attacks. The extension shows how a narrow browser extension can repackage data scraping as a 'tool' for Meta Business Suite and Facebook Business Manager. The extension is purpose-built to scrape high-value Meta surfaces that collect contact lists, access metadata, and 2FA material straight from authenticated pages.
Show sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
13.02.2026 13:25 1 articles · 4d ago
VK Styles Campaign Hijacks 500,000 VKontakte Accounts via Malicious Chrome Extensions
About 500,000 VKontakte users have had their accounts silently hijacked through Chrome extensions masquerading as VK customization tools. The large-scale campaign has been codenamed VK Styles. The malware embedded in the extensions is designed to engage in active account manipulation by automatically subscribing users to the attacker's VK groups, resetting account settings every 30 days to override user preferences, manipulating CSRF tokens to bypass VK's security protections, and maintaining persistent control. The activity has been traced to a threat actor operating under the GitHub username 2vk, who has relied on VK's own social network to distribute malicious payloads and build a follower base through forced subscriptions. The names of the extensions are VK Styles - Themes for vk.com (ID: ceibjdigmfbbgcpkkdpmjokkokklodmc), VK Music - audio saver (ID: mflibpdjoodmoppignjhciadahapkoch), Music Downloader - VKsaver (ID: lgakkahjfibfgmacigibnhcgepajgfdb), vksaver - music saver vk (ID: bndkfmmbidllaiccmpnbdonijmicaafn), and VKfeed - Download Music and Video from VK (ID: pcdgkgbadeggbnodegejccjffnoakcoh). The campaign has been active since at least June 22, 2025, when the initial version of the payload was pushed to the "-" repository. The repository associated with the VK Styles campaign is still accessible as of writing, with the file, simply named "C," receiving a total of 17 commits between June 2025 and January 2026. The repository shows deliberate refinement, indicating that the malware is a maintained software project with version control, testing, and iterative improvements. The campaign has primarily affected Russian-speaking users, who are VK's main demographic, as well as users across Eastern Europe, Central Asia, and Russian diaspora communities globally.
Show sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
13.02.2026 13:25 1 articles · 4d ago
287 Chrome Extensions Exfiltrate Browsing History to Data Brokers
A report published by Q Continuum found a huge collection of 287 Chrome extensions that exfiltrate browsing history to data brokers. These extensions have 37.4 million installations, representing roughly 1% of the global Chrome userbase.
Show sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
Information Snippets
-
Over 260,000 Google Chrome users downloaded fake AI assistant extensions.
First reported: 13.02.2026 13:253 sources, 3 articlesShow sources
- Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails — www.infosecurity-magazine.com — 13.02.2026 13:25
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
Over 30 malicious extensions were identified as part of a coordinated campaign called AiFrame.
First reported: 13.02.2026 13:253 sources, 3 articlesShow sources
- Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails — www.infosecurity-magazine.com — 13.02.2026 13:25
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The extensions mimicked popular AI assistants like Claude AI, ChatGPT, Grok, and Google Gemini.
First reported: 13.02.2026 13:253 sources, 3 articlesShow sources
- Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails — www.infosecurity-magazine.com — 13.02.2026 13:25
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The campaign used extension spraying to evade takedowns.
First reported: 13.02.2026 13:253 sources, 3 articlesShow sources
- Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails — www.infosecurity-magazine.com — 13.02.2026 13:25
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The extensions directed users to remote infrastructure to avoid detection.
First reported: 13.02.2026 13:253 sources, 3 articlesShow sources
- Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails — www.infosecurity-magazine.com — 13.02.2026 13:25
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The extensions exfiltrate data from Chrome and Gmail to attacker-controlled servers.
First reported: 13.02.2026 13:253 sources, 3 articlesShow sources
- Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails — www.infosecurity-magazine.com — 13.02.2026 13:25
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
LayerX warns that these extensions act as general-purpose access brokers.
First reported: 13.02.2026 13:253 sources, 3 articlesShow sources
- Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails — www.infosecurity-magazine.com — 13.02.2026 13:25
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
Many extensions have been removed from the Chrome Web Store, but users who downloaded them remain at risk.
First reported: 13.02.2026 13:253 sources, 3 articlesShow sources
- Fake AI Assistants in Google Chrome Web Store Steal Passwords and Spy on Emails — www.infosecurity-magazine.com — 13.02.2026 13:25
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The extension CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl) steals TOTP codes for Facebook and Meta Business accounts, Business Manager contact lists, and analytics data.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The extension CL Suite exfiltrates data to infrastructure controlled by the threat actor, including a backend at getauth[.]pro and a Telegram channel.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The extension CL Suite requests broad access to meta.com and facebook.com and claims in its privacy policy that 2FA secrets and Business Manager data remain local.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The extension CL Suite has 33 users as of writing and was first uploaded to the Chrome Web Store on March 1, 2025.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The extension CL Suite does not have capabilities to steal password-related information but can be used to gain unauthorized access to victims' accounts.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The extension CL Suite targets users of Meta Business Suite and Facebook Business Manager, leveraging the extension to conduct data collection and exfiltration without users' knowledge or consent.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The extension CL Suite gives the threat actor enough information to identify high-value targets and mount follow-on attacks.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The extension CL Suite shows how a narrow browser extension can repackage data scraping as a 'tool' for Meta Business Suite and Facebook Business Manager.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The extension CL Suite is purpose-built to scrape high-value Meta surfaces that collect contact lists, access metadata, and 2FA material straight from authenticated pages.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
About 500,000 VKontakte users have had their accounts silently hijacked through Chrome extensions masquerading as VK customization tools.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The large-scale campaign targeting VKontakte users has been codenamed VK Styles.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The malware embedded in the extensions designed to engage in active account manipulation by automatically subscribing users to the attacker's VK groups, resetting account settings every 30 days to override user preferences, manipulating CSRF tokens to bypass VK's security protections, and maintaining persistent control.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The activity has been traced to a threat actor operating under the GitHub username 2vk, who has relied on VK's own social network to distribute malicious payloads and build a follower base through forced subscriptions.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The names of the extensions targeting VKontakte users are VK Styles - Themes for vk.com (ID: ceibjdigmfbbgcpkkdpmjokkokklodmc), VK Music - audio saver (ID: mflibpdjoodmoppignjhciadahapkoch), Music Downloader - VKsaver (ID: lgakkahjfibfgmacigibnhcgepajgfdb), vksaver - music saver vk (ID: bndkfmmbidllaiccmpnbdonijmicaafn), and VKfeed - Download Music and Video from VK (ID: pcdgkgbadeggbnodegejccjffnoakcoh).
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The campaign targeting VKontakte users has been active since at least June 22, 2025, when the initial version of the payload was pushed to the "-" repository.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The repository associated with the VK Styles campaign is still accessible as of writing, with the file, simply named "C," receiving a total of 17 commits between June 2025 and January 2026.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The repository associated with the VK Styles campaign shows deliberate refinement, indicating that the malware is a maintained software project with version control, testing, and iterative improvements.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The campaign targeting VKontakte users has primarily affected Russian-speaking users, who are VK's main demographic, as well as users across Eastern Europe, Central Asia, and Russian diaspora communities globally.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
A cluster of 32 browser add-ons advertised as artificial intelligence (AI) assistants for summarization, chat, writing, and Gmail assistance are being used to siphon sensitive data.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The extensions targeting AI assistants have been collectively installed by more than 260,000 users.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
The extensions targeting AI assistants render a full-screen iframe overlay pointing to a remote domain ("claude.tapnetic[.]pro"), allowing the attackers to remotely introduce new capabilities without requiring a Chrome Web Store update.
First reported: 13.02.2026 13:252 sources, 2 articlesShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The extensions targeting AI assistants query the active browser tab and invoke a content script to extract readable article content using Mozilla's Readability library.
First reported: 13.02.2026 13:252 sources, 2 articlesShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The extensions targeting AI assistants support the capability to start speech recognition and exfiltrate the resulting transcript to the remote page.
First reported: 13.02.2026 13:252 sources, 2 articlesShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
A smaller set of the extensions targeting AI assistants contain functionality to specifically target Gmail by reading visible email content directly from the document object model (DOM) when a victim visits mail.google[.]com.
First reported: 13.02.2026 13:252 sources, 2 articlesShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
When Gmail-related features such as AI-assisted replies or summaries are invoked, the extracted email content is passed into the extension's logic and transmitted to third-party backend infrastructure controlled by the extension operator.
First reported: 13.02.2026 13:252 sources, 2 articlesShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
A report published by Q Continuum found a huge collection of 287 Chrome extensions that exfiltrate browsing history to data brokers. These extensions have 37.4 million installations, representing roughly 1% of the global Chrome userbase.
First reported: 13.02.2026 13:251 source, 1 articleShow sources
- Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History — thehackernews.com — 13.02.2026 13:25
-
LayerX security researcher Natalie Zargarov highlights that the extensions leverage brand association and users' familiarity with well-known model names.
First reported: 16.02.2026 16:001 source, 1 articleShow sources
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The extensions use a full-screen iframe pointing to an attacker-controlled domain, overlaid onto the current page in the victim's browser.
First reported: 16.02.2026 16:001 source, 1 articleShow sources
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The attacker's server captures sensitive information fed into the extensions, which might proxy a real large language model's (LLM) API.
First reported: 16.02.2026 16:001 source, 1 articleShow sources
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The extensions can read page content, transmit it to attacker-controlled servers, and return a summary, potentially retaining the full dataset remotely.
First reported: 16.02.2026 16:001 source, 1 articleShow sources
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The extensions can exfiltrate customer data, trade secrets, and regulated data outside corporate controls.
First reported: 16.02.2026 16:001 source, 1 articleShow sources
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
The extensions can appear compliant during review, with clean metadata, limited local code, and no obvious red flags in static analysis.
First reported: 16.02.2026 16:001 source, 1 articleShow sources
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
Google may not be deeply analyzing network endpoints, shared TLS certificates, reused hosting providers, and identical JavaScript bundles loaded remotely.
First reported: 16.02.2026 16:001 source, 1 articleShow sources
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
-
Some of the extensions remain available on the Chrome Web Store more than 24 hours after LayerX published its blog post.
First reported: 16.02.2026 16:001 source, 1 articleShow sources
- 260K+ Chrome Users Duped by Fake AI Browser Extensions — www.darkreading.com — 16.02.2026 16:00
Similar Happenings
Malicious Chrome Extensions Hijack Affiliate Links and Steal ChatGPT Tokens
Researchers have discovered malicious Google Chrome extensions that hijack affiliate links, steal data, and exfiltrate OpenAI ChatGPT authentication tokens. The extensions, including Amazon Ads Blocker and others, inject developer affiliate tags into e-commerce links, replacing existing affiliate codes. Additionally, a network of extensions targets ChatGPT users, intercepting authentication tokens to gain unauthorized access to accounts. The extensions violate Chrome Web Store policies and exploit user trust to execute malicious activities. The findings highlight the growing threat of malicious browser extensions, which can serve as lucrative attack vectors for adversaries.
Malicious Chrome Extension Targets MEXC API Keys via Telegram Exfiltration
A malicious Chrome extension named MEXC API Automator, masquerading as a trading automation tool, steals MEXC API keys by creating new keys with withdrawal permissions, hiding the permissions in the UI, and exfiltrating the keys to a Telegram bot. The extension remains active as long as the keys are valid, allowing attackers to control MEXC accounts, execute trades, and perform automated withdrawals. The threat actor leverages the Chrome Web Store for delivery, the MEXC web UI for execution, and Telegram for exfiltration. The extension has 29 downloads and is still available on the Chrome Web Store. The attacker's identity is unknown, but references point to a Telegram bot named SwapSushiBot promoted on TikTok and YouTube.
DarkSpectre Campaigns Target 8.8 Million Users with Malicious Browser Extensions
A Chinese threat actor, DarkSpectre, has been linked to three malicious browser extension campaigns—ShadyPanda, GhostPoster, and The Zoom Stealer—which have collectively impacted 8.8 million users across Google Chrome, Microsoft Edge, and Mozilla Firefox over seven years. The campaigns facilitate data theft, search query hijacking, affiliate fraud, and corporate espionage by exfiltrating meeting-related data from video conferencing platforms. Additionally, five new malicious Chrome extensions impersonating HR and ERP platforms have been discovered, targeting Workday, NetSuite, and SAP SuccessFactors to hijack accounts. These extensions steal authentication tokens, block incident response capabilities, and enable complete account takeover through session hijacking. The extensions, some of which were recently taken down, used delayed activation and benign updates to evade detection and build trust before deploying malicious functionality. The extensions were designed to look polished and professional, with some claiming to contain security features to prevent account compromise. They engaged in a range of actions to take control of accounts, including extracting authentication cookies and uploading them to a command and control (C2) server every 60 seconds. The extensions prevented passwords from being changed to help ensure stolen access tokens remained valid indefinitely and prevented security teams from locking out compromised accounts during remediation. Administrators attempting to disable an affected user's account encountered a blank page and redirect loop. Socket recommended that organizations implement Chrome Enterprise extension allowlists to prevent installation of unauthorized extensions and monitor for extensions targeting the same enterprise platforms with similar permission requests.
ShadyPanda Browser Extensions Campaign Exploits 4.3M Installs
The ShadyPanda campaign has amassed over 4.3 million installations of malicious Chrome and Edge browser extensions, evolving from legitimate tools into spyware over multiple phases. The extensions, discovered by Koi Security, engaged in affiliate fraud, search hijacking, and remote code execution. The campaign remains active on the Microsoft Edge Add-ons platform, with one extension having 3 million installs. The extensions collect browsing history, search queries, keystrokes, mouse clicks, and other sensitive data, exfiltrating it to domains in China. Users are advised to remove these extensions and reset their account passwords. The ShadyPanda campaign used a supply-chain attack tactic by publishing or acquiring harmless extensions, letting them run clean for years to build trust and gain millions of installs, then suddenly flipping them into malware via silent updates. The compromised extensions became a fully fledged remote code execution (RCE) framework inside the browser, capable of downloading and running arbitrary JavaScript with full access to the browser's data and capabilities. The extensions could steal session cookies and tokens, allowing them to impersonate entire SaaS accounts such as Microsoft 365 or Google Workspace. The risk of malicious browser extensions extends beyond individual users, as they can access cookies, local storage, cloud auth sessions, active web content, and file downloads, blurring the line between endpoint security and cloud security. Organizations should enforce extension allow lists, treat extension access like OAuth access, audit extension permissions regularly, and monitor for suspicious extension behavior to reduce the risk of malicious extensions. Modern SaaS security platforms, such as Reco's Dynamic SaaS Security platform, can help organizations monitor and detect suspicious activity related to browser extensions in real time.
AI Sidebar Spoofing Vulnerability in Atlas and Comet Browsers
Researchers from NeuralTrust have discovered a vulnerability in the OpenAI Atlas browser that allows for jailbreaking through the omnibox. This vulnerability can trick users into following malicious instructions, leading to potential data breaches and unauthorized actions. The attack works by disguising a prompt instruction as a URL, which is then treated as a trusted user intent. This can override user intent, trigger cross-domain actions, and bypass safety layers. The vulnerability affects the latest versions of the Atlas browser. Researchers demonstrated two realistic attack scenarios: a copy-link trap to phish credentials and destructive instructions to delete files. The attack requires only 'host' and 'storage' permissions, which are common for productivity tools. Users are advised to be cautious when using these browsers for sensitive activities and to restrict their use to non-sensitive tasks until further security measures are implemented. Earlier, researchers from SquareX discovered a similar vulnerability in OpenAI's Atlas and Perplexity's Comet browsers that allows for AI Sidebar Spoofing. This attack can trick users into following malicious instructions, leading to potential data breaches and unauthorized actions. The vulnerability affects the latest versions of both browsers and requires only 'host' and 'storage' permissions. Users are advised to be cautious and restrict the use of these browsers to non-sensitive activities.