Malicious AI-themed Chrome extensions have been discovered targeting more than 260,000 users through a coordinated surveillance and data-harvesting campaign. Marketed as productivity and AI assistant tools for summarization, chat support, and email enhancement, these extensions conceal hidden functionality that enables large-scale browser monitoring. Security researchers found that the extensions were designed to inject remotely controlled iframes into active browser sessions, allowing threat actors to dynamically manipulate content and extract sensitive information without user awareness. The malicious extensions share nearly identical codebases, permission sets, and command-and-control infrastructure, indicating an organized operation rather than isolated incidents. Once installed, the extensions request broad permissions to read and modify data across visited websites. They inject invisible iframes sourced from attacker-controlled domains, enabling remote script execution within legitimate browsing sessions. This mechanism allows operators to scrape webpage content, capture authenticated session data such as email content, and dynamically update malicious behavior without publishing new versions to the Chrome Web Store. Researchers also observed techniques that allow persistent reinfection, where similar variants are republished after removal, maintaining campaign continuity. The scope of exposure is significant due to the high installation counts and the sensitive nature of accessed data, including webmail, business communications, and potentially confidential enterprise information. Organizations and individual users are advised to audit installed browser extensions, remove unfamiliar AI-branded add-ons, and review granted permissions carefully. Implementing browser security controls, restricting extension installations in enterprise environments, and monitoring for unusual outbound connections can reduce risk. Regular security reviews and user awareness remain critical as threat actors increasingly exploit the popularity of AI tools to distribute malicious browser extensions.
A recent cyber campaign has been observed delivering a fileless variant of the Remcos Remote Access Trojan (RAT) through phishing emails. The attack primarily targets organizations...
As a result of an international law enforcement action orchestrated by the U.S. Justice Department, a large residential proxy service known as SocksEscort has been taken down. This...
Poland’s National Centre for Nuclear Research (NCBJ) was recently targeted by a cyberattack that disrupted parts of its IT infrastructure. The attack prompted the organization to...