By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
Computing

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

News Room
Last updated: 2025/05/20 at 11:58 AM
News Room Published 20 May 2025
Share
SHARE

May 20, 2025Ravie LakshmananCredential Theft / Browser Security

An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities but incorporate covert functionality to exfiltrate data, receive commands, and execute arbitrary code.

“The actor creates websites that masquerade as legitimate services, productivity tools, ad and media creation or analysis assistants, VPN services, crypto, banking and more to direct users to install corresponding malicious extensions on Google’s Chrome Web Store (CWS),” the DomainTools Intelligence (DTI) team said in a report shared with The Hacker News.

While the browser add-ons appear to offer the advertised features, they also enable credential and cookie theft, session hijacking, ad injection, malicious redirects, traffic manipulation, and phishing via DOM manipulation.

Cybersecurity

Another factor that works in the extensions’ favor is that they are configured to grant themselves excessive permissions via the manifest.json file, allowing them to interact with every site visited on the browser, execute arbitrary code retrieved from an attacker-controlled domain, perform malicious redirects, and even inject ads.

The extensions have also been found to rely on the “onreset” event handler on a temporary document object model (DOM) element to execute code, likely in an attempt to bypass content security policy (CSP).

Some of the identified lure websites impersonate legitimate products and services like DeepSeek, Manus, DeBank, FortiVPN, and Site Stats to entice users into downloading and installing the extensions. The add-ons then proceed to harvest browser cookies, fetch arbitrary scripts from a remote server, and set up a WebSocket connection to act as a network proxy for traffic routing.

There is currently no visibility into how victims are redirected to the bogus sites, but DomainTools told the publication that it could involve usual methods like phishing and social media.

“Because they appear in both Chrome Web Store and have adjacent websites, they can return from as results in normal web searches and for searches within the Chrome store,” the company said. “Many of the lure websites used Facebook tracking IDs, which strongly suggests they are leveraging Facebook / Meta apps in some way to attract site visitors. Possibly through Facebook pages, groups, and even ads.”

As of writing, it’s not known who is behind the campaign, although the threat actors have set up over 100 fake websites and malicious Chrome extensions. Google, for its part, has taken down the extensions.

Cybersecurity

To mitigate risks, users are advised to stick with verified developers before downloading extensions, review requested permissions, scrutinize reviews, and refrain from using lookalike extensions.

That said, it’s also worth keeping in mind that ratings could be manipulated and artificially inflated by filtering negative user feedback.

DomainTools, in an analysis published late last month, found evidence of extensions impersonating DeepSeek that redirected users providing low ratings (1-3 stars) to a private feedback form on the ai-chat-bot[.]pro domain, while sending those providing high ratings (4-5 stars) to the official Chrome Web Store review page.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article What It’s Like to Interview for a Job at DOGE
Next Article Chicago Sun-Times publishes made-up books and fake experts in AI debacle
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Twiga shifts strategy as it leans on Kenyan distributors for scale
Computing
Remove Your Personal Data from Google & ChatGPT
News
Cyberattack Takes Down Wisconsin-Based Mobile Carrier
News
How to Clean Up Your Gmail Inbox
Computing

You Might also Like

Computing

Twiga shifts strategy as it leans on Kenyan distributors for scale

7 Min Read
Computing

How to Clean Up Your Gmail Inbox

28 Min Read
Computing

Meet QuickPR, Winner of Startups of The Year 2024 in Noida, India | HackerNoon

9 Min Read
Computing

Red Hat Enterprise Linux 10.0 Formally Announced, Joined By RISC-V Developer Preview

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?