Security researchers have uncovered a supply-chain style attack involving a Chrome extension called QuickLens, which was previously featured and trusted in the Chrome Web Store. After the extension was sold to a new, unverified owner in February 2026, a silent update (version 5.8) transformed it into a remote code execution platform affecting roughly 7,000 users. The update introduced a command-and-control (C2) server, added powerful permissions, and deployed rules that stripped critical browser security headers such as Content-Security-Policy and X-Frame-Options. This left users vulnerable to clickjacking, cross-site scripting, and cross-domain data access while the extension continued functioning normally. The attack leveraged a stealthy “pixel injection” technique to execute malicious JavaScript on every page visited. The extension retrieved script payloads from a remote server, stored them locally, and executed them using a hidden 1×1 transparent GIF image element. Because security headers were removed globally, the injected scripts executed freely within the page context. This allowed attackers to capture session tokens, scrape page content, intercept form inputs, and exfiltrate sensitive data. The malicious payload never appeared in the extension’s static code, making detection through conventional analysis extremely difficult. Organizations should mitigate risks by enforcing strict browser extension allowlisting and monitoring for unexpected permission changes, especially additions like declarativeNetRequestWithHostAccess and webRequest. Users should regularly audit installed extensions and treat sudden permission prompts or ownership changes as warning signs. Security teams should monitor outbound connections to suspicious domains and educate users about extension supply-chain risks to prevent similar compromises.
An extensive phishing campaign using OAuth-based login flow has been developed to gain unauthorized access to user accounts in an attempt to circumvent passwords. The scam begin...
A newly discovered malware campaign combines a remote access trojan (RAT) with adware to achieve both persistent system control and immediate financial gain. This dual-threat appro...
A critical vulnerability identified as CVE-2026-5760 has been disclosed in SGLang, an open-source framework used for serving large language models. With a CVSS score of 9.8, the fl...