By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
Computing

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

News Room
Last updated: 2025/12/23 at 10:34 AM
News Room Published 23 December 2025
Share
Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
SHARE

Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials.

The extensions are advertised as a “multi-location network speed test plug-in” for developers and foreign trade personnel. Both the browser add-ons are available for download as of writing. The details of the extensions are as follows –

  • Phantom Shuttle (ID: fbfldogmkadejddihifklefknmikncaj) – 2,000 users (Published on November 26, 2017)
  • Phantom Shuttle (ID: ocpcmfmiidofonkbodpdhgddhlcmcofd) – 180 users (Published on April 27, 2023)

“Users pay subscriptions ranging from ¥9.9 to ¥95.9 CNY ($1.40 to $13.50 USD), believing they’re purchasing a legitimate VPN service, but both variants perform identical malicious operations,” Socket security researcher Kush Pandya said.

“Behind the subscription facade, the extensions execute complete traffic interception through authentication credential injection, operate as man-in-the-middle proxies, and continuously exfiltrate user data to the threat actor’s C2 [command-and-control] server.”

Once unsuspecting users make the payment, they receive VIP status and the extensions auto-enable “smarty” proxy mode, which routes traffic from over 170 targeted domains through the C2 infrastructure.

Cybersecurity

The extensions work as advertised to reinforce the illusion of a functional product. They perform actual latency tests on proxy servers and display connection status, while keeping users in the dark about their main goal, which is to intercept network traffic and steal credentials.

This involves malicious modifications prepended to two JavaScript libraries, namely, jquery-1.12.2.min.js and scripts.js, that come bundled with the extensions. The code is designed to automatically inject hard-coded proxy credentials (topfany / 963852wei) into every HTTP authentication challenge across all websites by registering a listener on chrome.webRequest.onAuthRequired.

“When any website or service requests HTTP authentication (Basic Auth, Digest Auth, or proxy authentication), this listener fires before the browser displays a credential prompt,” Pandya explained. “It immediately responds with the hardcoded proxy credentials, completely transparent to the user. The asyncBlocking mode ensures synchronous credential injection, preventing any user interaction.”

Once users authenticate to a proxy server, the extension configures Chrome’s proxy settings using a Proxy Auto-Configuration (PAC) script to implement three modes –

  • close, which disables the proxy feature
  • always, which routes all web traffic through the proxy
  • smarty, which routes a hard-coded list of more than 170 high-value domains through the proxy

The list of domains includes developer platforms (GitHub, Stack Overflow, Docker), cloud services (Amazon Web Services, Digital Ocean, Microsoft Azure), enterprise solutions (Cisco, IBM, VMware), social media (Facebook, Instagram, Twitter), and adult content sites. The inclusion of pornographic sites is likely an attempt to blackmail victims, Socket theorized.

The net result of this behavior is that user web traffic is routed through threat actor-controlled proxies while the extension maintains a 60-second heartbeat to its C2 server at phantomshuttle[.]space, a domain that remains operational. It also grants the attacker a “man-in-the-middle” (MitM) position to capture traffic, manipulate responses, and inject arbitrary payloads.

More importantly, the heartbeat message transmits a VIP user’s email, password in plaintext, and version number to an external server via an HTTP GET request every five minutes for continuous credential exfiltration and session monitoring.

“The combination of heartbeat exfiltration (credentials and metadata) plus proxy MitM (real-time traffic capture) provides comprehensive data theft capabilities operating continuously while the extension remains active,” Socket said.

Cybersecurity

Put differently, the extension captures passwords, credit card numbers, authentication cookies, browsing history, form data, API keys, and access tokens from users accessing the targeted domains while VIP mode is active. What’s more, the theft of developer secrets could pave the way for supply chain attacks.

It’s currently not known who is behind the eight-year-old operation, but the use of Chinese language in the extension description, the presence of Alipay/WeChat Pay integration to make payments, and the use of Alibaba Cloud to host the C2 domain points to a China-based operation.

“The subscription model creates victim retention while generating revenue, and the professional infrastructure with payment integration presents a facade of legitimacy,” Socket said. “Users believe they’re purchasing a VPN service while unknowingly enabling complete traffic compromise.”

The findings highlight how browser-based extensions are becoming an unmanaged risk layer for enterprises. Users who have installed the extensions are advised to remove them as soon as possible. For security teams, it’s essential to deploy extension allowlisting, monitor for extensions with subscription payment systems combined with proxy permissions, and implement network monitoring for suspicious proxy authentication attempts.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article How to watch ‘Shaun The Sheep: Fleece Navidad’ – stream from anywhere How to watch ‘Shaun The Sheep: Fleece Navidad’ – stream from anywhere
Next Article An AI Chatbot Tried To Contact The FBI – Here’s Why – BGR An AI Chatbot Tried To Contact The FBI – Here’s Why – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Best headphones deal: Sony WH-CH520 headphones for  at Amazon
Best headphones deal: Sony WH-CH520 headphones for $38 at Amazon
News
AMD Krackan Point Sub-0 Laptop Linux Performance Improves By ~8% In Just Six Months
AMD Krackan Point Sub-$500 Laptop Linux Performance Improves By ~8% In Just Six Months
Computing
MiniMax releases M2.1 AI model for multi-language programming versatility –  News
MiniMax releases M2.1 AI model for multi-language programming versatility – News
News
iOS 26.3 Will Play Nicer With Third-Party Headphones And Smartwatches, But Only In Europe – BGR
iOS 26.3 Will Play Nicer With Third-Party Headphones And Smartwatches, But Only In Europe – BGR
News

You Might also Like

AMD Krackan Point Sub-0 Laptop Linux Performance Improves By ~8% In Just Six Months
Computing

AMD Krackan Point Sub-$500 Laptop Linux Performance Improves By ~8% In Just Six Months

4 Min Read
Zeekr’s Tesla rival features off-road abilities, ADAS, lower price · TechNode
Computing

Zeekr’s Tesla rival features off-road abilities, ADAS, lower price · TechNode

4 Min Read
11 common mistakes that get social media accounts hacked
Computing

11 common mistakes that get social media accounts hacked

13 Min Read
How to Use ’s AI Caption Writer for Instagram |
Computing

How to Use ’s AI Caption Writer for Instagram |

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?