100+ websites lured victims into downloading malicious Chrome extensions

100+ websites lured victims into downloading malicious Chrome extensions

A threat actor has been running an ongoing and sophisticated campaign involving malicious Chrome browser extensions, first detected in February 2024. The extensions, while appearing as useful productivity tools or legitimate services, are in fact sophisticated tools for cyber espionage, data exfiltration, and browser hijacking.

According to a new report by the DomainTools Intelligence (DTI) team, the malicious extensions were distributed via convincing websites that impersonate a wide range of services, including VPNs, crypto platforms, and ad creation tools and banking utilities. The threat actors created and operated more than 100 fake websites to funnel users into downloading these extensions from the official Chrome Web Store.

“The extensions typically have a dual functionality, in which they generally appear to function as intended, but also connect to malicious servers to send user data, receive commands, and execute arbitrary code,” the researchers noted.

One notable aspect of the campaign is the use of the manifest.json file to grant elevated permissions to the malicious extensions. This allows them to interact with every webpage a user visits, load and execute arbitrary code from attacker-controlled servers, and inject ads or redirect traffic at will.

Additionally, the extensions were found to employ a lesser-known browser event, the onreset handler on a temporary DOM element, to execute malicious scripts. This technique may be designed to circumvent browser-enforced Content Security Policy (CSP) protections, enabling the covert execution of harmful commands.

Several of the campaign’s lure websites spoofed well-known services such as DeepSeek, Manus, DeBank, FortiVPN, and Site Stats. Once users were convinced to install the extensions, the malicious code harvested browser session cookies, established persistent WebSocket connections for command-and-control (C2) communication, and even turned browsers into proxy nodes for redirecting traffic.

While the exact method of initial victim targeting remains unclear, DomainTools believes phishing emails and social media channels may be involved.

“Many lure sites contained Facebook tracking IDs,” the researchers said, “suggesting the campaign may be leveraging Facebook pages, groups, or advertisements to drive traffic.”

Because the fake extensions were hosted on the Chrome Web Store and supported by professional-looking websites, they were easily discoverable through both traditional web search and Chrome Web Store queries, adding a layer of legitimacy to their appearance. Google has since removed the malicious extensions from the Chrome Web Store.

Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025