Dozens of Chrome Extensions Hacked, Over 2.6 Million Users Exposed to Data Theft
In a major cybersecurity breach, at least 35 popular Chrome browser extensions were compromised, exposing over 2.6 million users to potential data theft and credential harvesting. The attack targeted extension developers with a phishing campaign, allowing hackers to inject malicious code into legitimate extensions, turning trusted tools into data-stealing threats.
Table of Contents
How the Attack Happened
The breach began with a phishing email impersonating Google Chrome Web Store Developer Support. The email falsely claimed the targeted extensions were at risk of removal for violating policies and urged developers to follow a link to "resolve the issue." This link granted permissions to a malicious OAuth app called "Privacy Policy Extension", giving attackers access to the developers' accounts.
Once access was obtained, malicious code was uploaded into the affected extensions. This code:
- Stole cookies and user access tokens.
- Communicated with command-and-control (C&C) servers to download additional instructions.
- Exfiltrated user data for further exploitation.
The attack came to light when cybersecurity firm Cyberhaven disclosed that one of its employees was targeted on December 24. The firm’s browser extension was quickly exploited, but this incident was just the tip of the iceberg.
Full List of Compromised Extensions
As investigators dug deeper, they identified the following compromised Chrome extensions:
- AI Assistant - ChatGPT and Gemini for Chrome
- Bard AI Chat Extension
- GPT 4 Summary with OpenAI
- Search Copilot AI Assistant for Chrome
- TinaMind AI Assistant
- Wayin AI
- VPNCity
- Internxt VPN
- Vidnoz Flex Video Recorder
- VidHelper Video Downloader
- Bookmark Favicon Changer
- Castorus
- Uvoice
- Reader Mode
- Parrot Talks
- Primus
- Tackker - Online Keylogger Tool
- AI Shop Buddy
- Sort by Oldest
- Rewards Search Automator
- ChatGPT Assistant - Smart Search
- Keyboard History Recorder
- Email Hunter
- Visual Effects for Google Meet
- Earny - Up to 20% Cash Back
- Where is Cookie?
- Web Mirror
- ChatGPT App
- Hi AI
- Web3Password Manager
- YesCaptcha Assistant
- Proxy SwitchyOmega (V3)
- GraphQL Network Inspector
- ChatGPT for Google Meet
- GPT 4 Summary with OpenAI
This comprehensive list highlights the extent of the breach, affecting extensions used for AI assistance, VPN services, productivity, and more.
Malicious Activities Uncovered
The attackers did more than just steal data. Analysis of compromised extensions revealed:
- Identity and credential targeting: Malicious code sought out access tokens and identity information, particularly Facebook Ads accounts.
- Mouse-click monitoring: Code logged user clicks on Facebook pages to capture QR codes, potentially bypassing two-factor authentication (2FA).
- Monetization schemes: In some cases, developers had already included data-harvesting SDKs for monetization before the breach.
Extensions like Visual Effects for Google Meet used an ad-blocking library linked to Urban VPN that stealthily collected user data.
How Long Has This Been Happening?
Evidence suggests this campaign may have been active since 2022 or earlier. Investigators traced domain registrations tied to the malicious activity as far back as 2021. For example:
- The domain nagofsg[.]com was registered in August 2022.
- The domain sclpfybn[.]com was registered in July 2021.
Ongoing Risks
Although many compromised extensions have been removed or updated on the Chrome Web Store, the risk isn’t fully mitigated. If the malicious version of an extension is still active on a user's device, it can continue stealing data.
"Removing an extension from the Chrome Web Store doesn’t automatically remove it from user endpoints," warns Or Eshed, CEO of LayerX Security.
What You Can Do
Here are steps you can take to protect your data:
- Uninstall Affected Extensions: Review the list of compromised extensions and remove any you have installed.
- Revoke Permissions: If you granted any permissions to suspicious extensions or apps, revoke them immediately in your Google account settings.
- Enable 2FA: Strengthen your accounts with two-factor authentication wherever possible.
- Update Passwords: Change passwords for accounts that might have been exposed.
- Monitor for Unusual Activity: Watch for unauthorized access or activity on your accounts.
Final Thoughts
This incident underscores the critical need for vigilance when using browser extensions. While extensions are powerful tools, they also represent significant security risks if compromised. Developers and users alike must remain alert to phishing campaigns and scrutinize permissions and updates.
Google’s Chrome Web Store review process will also need to adapt to better detect malicious activity and protect users from similar threats in the future.
By staying informed and proactive, users can help minimize the risks posed by this and future attacks. Don’t let trusted tools become a gateway for cybercriminals—take action to safeguard your data today.








