← Back to BrewedIntel
malwarehighAd InjectionBrowser HijackingData ExfiltrationMalicious Browser Extensions

Apr 14, 2026 • [email protected] (The Hacker News)

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

Security researchers at Socket have identified a campaign involving 108 malicious Google Chrome extensions communicating with a unified command-and-control...

Source
The Hacker News
Category
malware
Severity
high

Executive Summary

Security researchers at Socket have identified a campaign involving 108 malicious Google Chrome extensions communicating with a unified command-and-control (C2) infrastructure. The extensions target approximately 20,000 users by collecting sensitive data and enabling browser-level abuse through ad injection and arbitrary JavaScript execution on visited websites. The coordinated nature of the campaign, evidenced by shared C2 infrastructure across all extensions, suggests organized threat actor activity. Organizations should immediately audit installed Chrome extensions, remove unverified or unnecessary add-ons, and educate users about the risks of installing extensions from untrusted sources. Users should verify extension publishers and review requested permissions before installation.

Summary

Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited. According to Socket, the extensions (complete list

Published Analysis

Security researchers at Socket have identified a campaign involving 108 malicious Google Chrome extensions communicating with a unified command-and-control (C2) infrastructure. The extensions target approximately 20,000 users by collecting sensitive data and enabling browser-level abuse through ad injection and arbitrary JavaScript execution on visited websites. The coordinated nature of the campaign, evidenced by shared C2 infrastructure across all extensions, suggests organized threat actor activity. Organizations should immediately audit installed Chrome extensions, remove unverified or unnecessary add-ons, and educate users about the risks of installing extensions from untrusted sources. Users should verify extension publishers and review requested permissions before installation. Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited. According to Socket, the extensions (complete list Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited. According to Socket, the extensions (complete list