Malicious Phantom Shuttle Chrome extensions hijack user traffic

Two Chrome extensions listed in the Web Store under the name Phantom Shuttle masqueraded as proxy service plugins are hijacking user traffic and stealing sensitive data, according to a report by supply-chain security firm Socket.

The extensions, which have been active since at least 2017, remain available in Chrome’s official marketplace at the time of writing. The tools are published under the same developer name and marketed primarily to users in China, including foreign trade workers who need to test internet connectivity from different regions of the country. Subscriptions are priced between $1.40 and $13.60.

Researchers say the extensions route all web traffic through attacker-controlled proxy servers using hardcoded credentials hidden with a custom encoding scheme. The malicious code is prepended to a legitimate jQuery library to evade detection. By dynamically reconfiguring Chrome’s proxy settings, the extensions force traffic through the proxies automatically.

In the default “smarty” mode, the extensions route traffic from more than 170 high-value domains, including developer platforms, cloud consoles, social media sites, and adult content portals, through the attacker’s network. Local networks and the command-and-control (C&C) domain are excluded to reduce the risk of disruption and detection.

Acting as a man-in-the-middle, the extensions can intercept authentication challenges, capture credentials and personal data from web forms, steal session cookies, and extract API tokens from network requests.

Users are advised to install extensions only from reputable publishers, review permissions carefully, and check multiple user reviews before installing.

Back to the list

Latest Posts

Hackers target Afghan government workers with fake correspondence from senior officials

The campaign, tracked as ‘Nomad Leopard,’ appears to be the work of a regionally focused actor with low-to-moderate sophistication.
21 January 2026

VoidLink malware likely built by a single developer using AI

Researchers say the developer relied on Spec-Driven Development, using AI to define goals, constraints, and a multi-team development plan.
21 January 2026

North Korean hackers abuse VS Code projects to deliver backdoors

The campaign targets software developers by posing as job recruiters and instructing victims to clone repositories hosted on GitHub, GitLab, or Bitbucket.
21 January 2026