{"id":45413,"date":"2026-04-15T05:24:47","date_gmt":"2026-04-14T21:24:47","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data\/"},"modified":"2026-04-15T05:24:47","modified_gmt":"2026-04-14T21:24:47","slug":"over-100-chrome-extensions-in-web-store-target-users-accounts-and-data","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data\/","title":{"rendered":"Over 100 Chrome extensions in Web Store target users accounts and data"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/03\/13\/Google_Chrome.jpg\" width=\"1600\" alt=\"Over 100 Chrome extensions in Web Store target users accounts and data\"><\/p>\n<p>More than 100 malicious extensions in the official Chrome Web Store are attempting to steal Google OAuth2 Bearer tokens, deploy backdoors, and carry out ad fraud.<\/p>\n<p>Researchers at application security company Socket discovered that the malicious extensions are part of a coordinated campaign that uses the same command-and-control (C2) infrastructure.<\/p>\n<p>The threat actor published the extensions under five distinct publisher identities in multiple categories:&nbsp;Telegram sidebar clients, slot machine and Keno games, YouTube and TikTok enhancers, a text translation tool, and utilities.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Over 100 Chrome extensions in Web Store target users accounts and data\"><\/a> <\/div>\n<p>According to the researchers, the campaign uses a central backend hosted on a Contabo VPS, with multiple subdomains handling session hijacking, identity collection, command execution, and monetization operations.<\/p>\n<p>Socket has found&nbsp;evidence indicating a Russian malware-as-a-service (MaaS) operation, based on comments in the code for authentication and session theft.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"600\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/exts.jpg\" width=\"424\" alt=\"Over 100 Chrome extensions in Web Store target users accounts and data\"><figcaption><strong>Extensions linked to the same campaign<\/strong><br \/><em>Source: Socket<\/em><\/figcaption><\/figure>\n<\/div>\n<h3>Harvesting data and hijacking accounts<\/h3>\n<p>The largest cluster, comprising 78 extensions, injects attacker-controlled HTML into the user interface via the &lsquo;innerHTML&rsquo; property.<\/p>\n<p>The second-largest group, with 54 extensions, uses &lsquo;chrome.identity.getAuthToken&rsquo; to collect the victim&rsquo;s email, name, profile picture, and Google account ID.<\/p>\n<p>They also steal the&nbsp;Google OAuth2 Bearer token, a short-lived access token that permits applications to access a user&#8217;s data or to act on their behalf.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"600\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"741\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/googleharve.jpg\" alt=\"Over 100 Chrome extensions in Web Store target users accounts and data\"><figcaption><strong>Google account data harvesting<\/strong><br \/><em>Source: Socket<\/em><\/figcaption><\/figure>\n<\/div>\n<p>A third batch of 45 extensions features a hidden function that runs on browser startup, acting as a backdoor that fetches commands from the C2 and can open arbitrary URLs. This function does not require the user to interact with the extension.<\/p>\n<p>One extension highlighted by Socket as &ldquo;the most severe&rdquo; steals Telegram Web sessions every 15 seconds, extracts session data from &lsquo;localStorage&rsquo; and the session token for Telegram Web, and sends the info to the C2.<\/p>\n<p>&ldquo;The extension also handles an inbound message (set_session_changed) that performs the reverse operation: it clears the victim&#8217;s localStorage, overwrites it with threat actor-supplied session data, and force-reloads Telegram,&rdquo; <a href=\"https:\/\/socket.dev\/blog\/108-chrome-ext-linked-to-data-exfil-session-theft-shared-c2\" target=\"_blank\" rel=\"nofollow noopener\">describes Socket<\/a>.<\/p>\n<p>&ldquo;This allows the operator to swap any victim&#8217;s browser into a different Telegram account without the victim&#8217;s knowledge.&rdquo;<\/p>\n<p>The researchers also found&nbsp;three extensions that strip security headers and inject ads into YouTube and TikTok, one that proxies translation requests through a malicious server, and a non-active Telegram session theft extension that uses staged infrastructure.<\/p>\n<p>Socket has notified Google about the campaign, but warns that&nbsp;all malicious extensions are still available on the Chrome Web Store at the time of publishing their report.<\/p>\n<p>BleepingComputer confirms that many of the extensions listed in Socket&rsquo;s report are still available at publishing time. We have reached out to Google for a comment on this, but we have not heard back.<\/p>\n<p>Users are recommended to search their installed extensions against the IDs Socket published, and uninstall any matches immediately.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Over 100 Chrome extensions in Web Store target users accounts and data\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/quicklens-chrome-extension-steals-crypto-shows-clickfix-attack\/\">QuickLens Chrome extension steals crypto, shows ClickFix attack<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/mcgraw-hill-confirms-data-breach-following-extortion-threat\/\">McGraw-Hill confirms data breach following extortion threat<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach\/\">Snowflake customers hit in data theft attacks after SaaS integrator breach<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-use-pixel-large-svg-trick-to-hide-credit-card-stealer\/\">Hackers use pixel-large SVG trick to hide credit card stealer<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-chrome-adds-infostealer-protection-against-session-cookie-theft\/\">Google Chrome adds infostealer protection against session cookie theft<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>More than 100 malicious extensions in the official Chro [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45413","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45413"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45413\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}