108 Chrome Extensions Turned Into A Data Heist
A massive and coordinated malware campaign has exposed just how dangerous seemingly harmless browser add-ons can be. Security researchers have identified 108 malicious Chrome extensions that were secretly stealing sensitive user data, hijacking sessions, and injecting harmful scripts, all while posing as useful everyday tools.
At first glance, these extensions appeared legitimate. They advertised features like Telegram sidebars, YouTube and TikTok enhancements, translation tools, and even casual games such as slot machines. This wide variety helped them blend into the Chrome Web Store and appeal to a broad audience. However, behind the scenes, all of them were connected to the same attacker-controlled infrastructure, designed to harvest user data and exploit browser access.
Once installed, the extensions quietly carried out malicious activity without users realizing it. They captured session data, including login tokens that could allow attackers to access accounts without needing passwords. In addition, they injected arbitrary scripts into web pages and redirected users to attacker-controlled sites, opening the door to further exploitation such as phishing or malware delivery.
The scope of the data theft is particularly alarming. Researchers found that these extensions were capable of collecting Google account information, browsing activity, and even hijacking Telegram sessions. In some cases, they also injected unwanted ads, including gambling-related content, directly into users’ browsing experiences, turning victims into sources of illicit revenue.
Despite their malicious nature, these extensions managed to rack up over 20,000 installs, highlighting ongoing challenges in detecting harmful software within official app marketplaces. Many were published under different developer identities, yet all funneled stolen data back to the same central servers, suggesting a well-organized and coordinated operation.
This incident underscores a broader issue with browser extensions: they often require extensive permissions, giving them access to sensitive information like browsing history, cookies, and active sessions. When abused, this level of access can effectively turn an extension into a powerful surveillance tool operating inside the user’s browser.
Security experts strongly advise users to review their installed extensions and remove anything unfamiliar or unnecessary. Even extensions that appear trustworthy can be compromised or updated with malicious code over time. As this campaign shows, the line between helpful tool and hidden threat can be dangerously thin.
Ultimately, the discovery of these 108 malicious extensions is a stark reminder that convenience often comes with risk. In a digital environment where extensions can see and modify nearly everything you do online, vigilance is no longer optional, it’s essential.







