Over 100 Malicious Chrome Extensions Found Stealing User Data Through Spoofed VPN and Productivity Tools

Over 100 Malicious Chrome Extensions Found Stealing User Data Through Spoofed VPN and Productivity Tools
Over 100 Malicious Chrome Extensions Found Stealing User Data Through Spoofed VPN and Productivity Tools
Table of Contents
    Add a header to begin generating the table of contents

    A widespread campaign targeting Chrome browser users is using over 100 malicious extensions to steal data, inject remote scripts, and manipulate network traffic through the Google Chrome Web Store. These extensions mimic popular brands such as Fortinet, YouTube, DeepSeek AI, and Calendly.

    Discovered by DomainTools researchers, the operation involves a network of fake domains that promote these extensions, increasing the likelihood of user downloads via malvertising. The campaign impersonates legitimate tools including VPNs, AI assistants, and crypto utilities, offering some expected functionality while secretly enabling backdoor access to user data.

    “The Chrome Web Store has removed multiple of the actor’s malicious extensions after malware identification,” said the researchers.
    “However, the actor’s persistence and the time lag in detection and removal pose a threat to users seeking productivity tools and browser enhancements.”

    Extensions Used to Steal Cookies, Inject Code, and Act as Proxies

    Once installed, the malicious Chrome extensions request dangerous permissions that allow them to:

    • Steal browser cookies, including session tokens
    • Perform DOM-based phishing
    • Dynamically inject remote JavaScript code
    • Act as network proxies
    • Modify browser traffic to deliver ads or redirect sessions

    One such extension, “fortivpn,” was observed using chrome.cookies.getAll({}) to capture all browser cookies. It compresses the data with Pako, encodes it in Base64, and sends it to a remote server (infograph[.]top).

    The same extension can establish WebSocket connections and act as a proxy server, potentially rerouting user traffic through attacker-controlled infrastructure. It also supports proxy authentication, enabling more covert surveillance.

    Fake Domains Impersonating Brands Found Across Campaign

    DomainTools listed numerous fake domains pushing these malicious Chrome extensions, including:

    • forti-vpn[.]com, fortivnp[.]com
    • youtube-vision[.]com, youtube-vision[.]world
    • deepseek-ai[.]link
    • calendlydocker[.]com, calendly-director[.]com
    • earthvpn[.]top, raccoon-vpn[.]world
    • madgicxads[.]world, madgicx-plus[.]com
    • workfront-plus[.]com, flight-radar[.]life

    These sites include deceptive “Add to Chrome” buttons that link directly to the Chrome Web Store, falsely reinforcing legitimacy.

    While Google has removed many of the malicious extensions, some remain active, posing ongoing risk to users who seek browser enhancements or security tools.


    Risks Include Account Takeover and Corporate Network Breaches

    By stealing session cookies and acting as network proxies, the extensions allow attackers to:

    • Hijack online accounts
    • Monitor browsing behavior
    • Gain unauthorized access to internal enterprise systems
    • Breach corporate VPN devices or platforms

    These extensions effectively give attackers full visibility into the user’s online activity and enable them to bypass authentication mechanisms by reusing stolen session tokens.

    Security Recommendations for Enterprise Users

    Enterprises are advised to:

    • Scrutinize Chrome extension permissions before deployment
    • Limit installation to extensions from known, trusted publishers
    • Review extension reviews and publisher reputation
    • Conduct browser extension audits across managed devices

    The operation highlights how browser-based threats remain a significant vector for data theft and corporate compromise, especially when leveraging trusted platforms like the Chrome Web Store.

    Related Posts