Malicious Chrome Extensions Steal Google & Telegram Data

Overview Researchers have uncovered a campaign involving 108 malicious Chrome extensions that secretly steal Google and Telegram credentials. More than 20,000 users worldwide have already been impacted. These extensions look like everyday productivity tools but are actually designed to connect to attacker-controlled servers, enabling credential theft, ad injection, and even running malicious scripts on websites you visit.

In simple terms: what seems like a harmless browser add-on could be spying on you, stealing your login details, and manipulating your browsing experience.

Campaign Details

  • Discovery: Security researchers identified a cluster of 108 extensions tied to the same malicious infrastructure.
  • Impact: Over 20,000 users affected globally.
  • Targeted data: Google account credentials, Telegram session data, browsing activity.
  • Distribution: Extensions disguised as legitimate productivity or utility tools.

Technical Breakdown

  • Command-and-control (C2): All extensions communicate with a shared server for centralized control.
  • Capabilities:
    • Credential theft: Extracts login details from Google and Telegram.
    • Ad injection: Inserts unwanted ads into web pages.
    • JavaScript execution: Runs arbitrary scripts across visited sites.
  • Persistence: Extensions remain active until manually removed, often masquerading as harmless add-ons.

Risks to Users

  • Account compromise: Stolen credentials can lead to identity theft and fraud.
  • Financial exposure: Attackers may exploit compromised accounts for phishing or scams.
  • Privacy erosion: Continuous monitoring of browsing activity enables profiling and targeted exploitation.

Defensive Guidance

  • Audit extensions: Regularly check installed Chrome extensions and remove anything unfamiliar.
  • Download safely: Only install extensions from the official Chrome Web Store and verify developer credibility.
  • Enable MFA: Protect Google and Telegram accounts with multi-factor authentication.
  • Monitor accounts: Watch for unusual login attempts or unauthorized activity.
  • Enterprise response: Organizations should deploy browser security controls and monitor endpoints for malicious extension activity.

Final Thought

This campaign shows how attackers are shifting focus from traditional malware to browser extensions, exploiting the trust users place in everyday tools. With over 20,000 victims already impacted, the lesson is clear: extensions must be treated as potential attack vectors, requiring strict vetting, monitoring, and user awareness.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.