Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Dune Half Three Trailer Reveals the Weight Paul Atreides Carries After Victory

March 17, 2026

Australian tea model T2 Tea to shutter all Singapore shops

March 17, 2026

Lenovo Accelerates Manufacturing-Prepared Enterprise AI with NVIDIA—From AI Inferencing to Gigawatt-Scale AI Factories

March 17, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Dune Half Three Trailer Reveals the Weight Paul Atreides Carries After Victory
  • Australian tea model T2 Tea to shutter all Singapore shops
  • Lenovo Accelerates Manufacturing-Prepared Enterprise AI with NVIDIA—From AI Inferencing to Gigawatt-Scale AI Factories
  • Fincra sees Canadian licence as blueprint for world hall play
  • Is Premium Manufacturers Holdings inventory a purchase?
  • Akamai Launches AI Grid Clever Orchestration for Distributed Inference Throughout 4,400 Edge Places
  • Ndovu launches new fund to chase Kenya’s prosperous traders
  • NVIDIA’s NemoClaw Offers Private AI Brokers the Security Firms Want
Tuesday, March 17
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - Chrome Extension Turns Malicious After Possession Switch, Enabling Code Injection and Information Theft
Cybersecurity & Digital Rights

Chrome Extension Turns Malicious After Possession Switch, Enabling Code Injection and Information Theft

NextTechBy NextTechMarch 17, 2026No Comments8 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
Chrome Extension Turns Malicious After Possession Switch, Enabling Code Injection and Information Theft
Share
Facebook Twitter LinkedIn Pinterest Email


Two Google Chrome extensions have turned malicious after what seems to be a case of possession switch, providing attackers a option to push malware to downstream clients, inject arbitrary code, and harvest delicate information.

The extensions in query, each initially related to a developer named “akshayanuonline@gmail.com” (BuildMelon), are listed beneath –

  • QuickLens – Search Display with Google Lens (ID: kdenlnncndfnhkognokgfpabgkgehodd) – 7,000 customers
  • ShotBird – Scrolling Screenshots, Tweet Photographs & Editor (ID: gengfhhkjekmlejbhmmopegofnoifnjp) – 800 customers

Whereas QuickLens is not accessible for obtain from the Chrome Net Retailer, ShotBird stays accessible as of writing. ShotBird was initially launched in November 2024, with its developer, Akshay Anu S (@AkshayAnuOnline), claiming on X that the extension is appropriate for “creating skilled, studio-like visuals,” and that each one processing occurs domestically.

In line with analysis revealed by monxresearch-sec, the browser add-on acquired a “Featured” flag in January 2025, earlier than it was handed on to a unique developer (“loraprice198865@gmail.com”) someday final month.

In the same vein, QuickLens was listed on the market on ExtensionHub on October 11, 2025, by “akshayanuonline@gmail.com” merely two days after it was revealed, Annex Safety’s John Tuckner mentioned. On February 1, 2026, the extension’s proprietor modified to “assist@doodlebuggle.high” on the Chrome Net Retailer itemizing web page.

The malicious replace launched to QuickLens on February 17, 2026, stored the unique performance however launched capacities to strip safety headers (e.g., X-Body-Choices) from each HTTP response, permitting malicious scripts injected into an internet web page to make arbitrary requests to different domains, bypassing Content material Safety Coverage (CSP) protections.

As well as, the extension contained code to fingerprint the consumer’s nation, detect the browser and working system, and polls an exterior server each 5 minutes to obtain JavaScript, which is saved within the browser’s native storage and executed on each web page load by including a hidden 1×1 GIF factor and setting the JavaScript string as its “onload” attribute. This, in flip, causes the malicious code to be executed as soon as the picture is loaded.

short

“The precise malicious code by no means seems within the extension’s supply information,” Tuckner defined. “Static evaluation reveals a perform that creates picture components. That is it. The payloads are delivered from the C2 and saved in native storage — they solely exist at runtime.”

An identical evaluation of the ShotBird extension by monxresearch-sec has uncovered the usage of direct callbacks to ship JavaScript code as an alternative of making a 1×1 pixel picture to set off the execution. The JavaScript is engineered to show a bogus Google Chrome browser replace immediate, clicking which customers are served a ClickFix-style web page to open the Home windows Run dialog, launch “cmd.exe,” and paste a PowerShell command, ensuing within the obtain of an executable named “googleupdate.exe” on Home windows hosts.

supply

The malware then proceeds to hook enter, textarea, choose HTML components, and seize any information entered by the sufferer. This might embody credentials, PIN, card particulars, tokens, and authorities identifiers. It is also geared up to siphon information saved within the Chrome net browser, similar to passwords, searching historical past, and extension-related info.

“It is a two-stage abuse chain: extension-side distant browser management plus host-level execution pivot through pretend updates,” the researcher mentioned. “The result’s high-risk information publicity in-browser and confirmed host-side script execution on not less than one affected system. In sensible phrases, this elevates the affect from browser-only abuse to doubtless credential theft and broader endpoint compromise.”

It is assessed that the identical risk actor is behind the compromise of the 2 extensions and is working them in parallel, given the usage of an an identical command-and-control (C2) structure sample, ClickFix lures injected into the searching context, and possession switch as an an infection vector.

chrome malware

Curiously, the unique extension developer has revealed a number of different extensions beneath their title on the Chrome Net Retailer, and all of them have acquired a Featured badge. The developer additionally has an account on ExtensionHub, though no extensions are presently listed on the market. What’s extra, the person has tried to promote domains like “AIInfraStack[.]com” for $2,500, stating the “robust key phrase area” is “related for [sic] quickly rising AI ecosystem.”

“That is the extension provide chain drawback in a nutshell,” Annex Safety mentioned. “A ‘Featured,’ reviewed, practical extension adjustments arms, and the brand new proprietor pushes a weaponized replace to each current consumer.”

The disclosure comes as Microsoft warned of the malicious Chromium‑primarily based browser extensions that masquerade as legit AI assistant instruments to reap LLM chat histories and searching information.

“At scale, this exercise turns a seemingly trusted productiveness extension right into a persistent information assortment mechanism embedded in on a regular basis enterprise browser utilization, highlighting the rising danger browser extensions pose in company environments,” the Microsoft Defender Safety Analysis Staff mentioned.

In latest weeks, risk hunters have additionally flagged a malicious Chrome extension named lmΤoken Chromophore (ID: bbhaganppipihlhjgaaeeeefbaoihcgi) that impersonates imToken whereas promoting itself as a hex shade visualizer within the Chrome Net Retailer to steal cryptocurrency seed phrases utilizing phishing redirects.

“As an alternative of offering the innocent instrument it guarantees, the extension routinely opens a risk actor-controlled phishing website as quickly as it’s put in, and once more at any time when the consumer clicks it,” Socket researcher Kirill Boychenko mentioned.

“On set up, the extension fetches a vacation spot URL from a hardcoded JSONKeeper endpoint (jsonkeeper[.]com/b/KUWNE) and opens a tab pointing to a lookalike Chrome Net Retailer-style area, chroomewedbstorre-detail-extension[.]com. The touchdown web page impersonates imToken utilizing mixed-script homoglyphs and funnels victims into credential-capture flows that request both a 12 or 24-word seed phrase or a non-public key.”

Different malicious extensions flagged by Palo Alto Networks Networks Unit 42 have been discovered to interact in affiliate hijacking and information exfiltration, with considered one of them – Chrome MCP Server – AI Browser Management (ID: fpeabamapgecnidibdmjoepaiehokgda) – serving as a full-fledged distant entry trojan whereas masquerading as an AI automation instrument utilizing the Mannequin Context Protocol (MCP).

Unit 42 researchers have additionally revealed that three widespread Chrome extensions – City VPN Proxy, City Browser Guard, and City Advert Blocker – are once more accessible on the Chrome Net Retailer after beforehand being eliminated for scraping AI conversations from varied chatbots, together with OpenAI ChatGPT, Anthropic Claude, Microsoft Copilot, DeepSeek, Google Gemini, xAI Grok, Meta AI, and Perplexity.

“Following the general public disclosure of the marketing campaign on December 15, 2025, the developer up to date benign variations in January 2026, doubtless in response to the report,” researchers Qinge Xie, Nabeel Mohamed, Shresta Bellary Seetharam, Fang Liu, Billy Melicher, and Alex Starov mentioned.

Moreover, the cybersecurity firm recognized an extension referred to as Palette Creator (ID: iofmialeiddolmdlkbheakaefefkjokp), which has over 100,000 customers and whose earlier model communicated with recognized community indicators related to a marketing campaign dubbed RedDirection to hold out browser hijacking.

That is not all. A brand new marketing campaign comprising over 30,000 domains has been discovered to provoke a redirect chain to route site visitors to a touchdown web page (“ansiblealgorithm[.]com”) that is used for distributing a Chrome extension referred to as OmniBar AI Chat and Search (ID: ajfanjhcdgaohcbphpaceglgpgaaohod).

The extension makes use of the chrome_settings_overrides API to change Chrome settings and set the browser house web page to omnibar[.]ai, in addition to make the default search supplier to a customized URL: “go.omnibar[.]ai/?api=omni&sub1=omnibar.ai&q={searchTerms}​” and observe queries through an API parameter.

It is believed that the tip aim is to carry out browser-hijacking as a part of what appears to be a large-scale internet online affiliate marketing scheme, Unit 42 mentioned, including it recognized two different extensions that exhibit the identical browser-hijacking habits per OmniBar through house web page override and search interception –

  • AI Output Algo Software (ID: eeoonfhmbjlmienmmbgapfloddpmoalh)
  • Serpey.com official extension (ID: hokdpdlchkgcenfpiibjjfkfmleoknkp)

A deeper investigation of three extra extensions revealed by the identical developer (“jon@status77.com” aka Standing 77) has uncovered that two of them observe consumer searching exercise to inject affiliate markers, whereas a 3rd one extracts and transmits consumer Reddit remark threads to a developer-controlled API endpoint –

  • Care.Sale (ID: jaioobipjdejpeckgojiojjahmkiaihp)
  • Big Coupons Official Extension (ID: akdajpomgjgldidenledjjiemgkjcchc)
  • Consensus – Reddit Remark Summarizer (ID: mkkfklcadlnkhgapjeejemflhamcdjld)

Customers who’ve put in any of the aforementioned extensions are suggested to take away them from their browsers with fast impact, keep away from side-loading or putting in unverified productiveness extensions, and audit browsers for any unknown extensions and uninstall them.

Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a world community of future-focused thinkers.
Unlock tomorrow’s tendencies right now: learn extra, subscribe to our e-newsletter, and develop into a part of the NextTech group at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

March 17, 2026

Important n8n Flaws Permit Distant Code Execution and Publicity of Saved Credentials

March 16, 2026

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Cases Stay Uncovered

March 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Dune Half Three Trailer Reveals the Weight Paul Atreides Carries After Victory

By NextTechMarch 17, 2026

Crowds flocked to the AMC Century Metropolis theater in Los Angeles this morning for a…

Australian tea model T2 Tea to shutter all Singapore shops

March 17, 2026

Lenovo Accelerates Manufacturing-Prepared Enterprise AI with NVIDIA—From AI Inferencing to Gigawatt-Scale AI Factories

March 17, 2026
Top Trending

Dune Half Three Trailer Reveals the Weight Paul Atreides Carries After Victory

By NextTechMarch 17, 2026

Crowds flocked to the AMC Century Metropolis theater in Los Angeles this…

Australian tea model T2 Tea to shutter all Singapore shops

By NextTechMarch 17, 2026

The closures come 9 years after the model opened its first outlet…

Lenovo Accelerates Manufacturing-Prepared Enterprise AI with NVIDIA—From AI Inferencing to Gigawatt-Scale AI Factories

By NextTechMarch 17, 2026

Immediately at NVIDIA GTC, Lenovo unveiled new Lenovo Hybrid AI Benefit with NVIDIA options designed to…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!