Scams & Phishing News 108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

Status
Not open for further replies.

Brownie2019

Level 23
Thread author
Verified
Well-known
Forum Veteran
Mar 9, 2019
969
4,663
2,168
Germany
Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited.

According to Socket, the extensions (complete list here) are published under five distinct publisher identities – Yana Project, GameGen, SideGames, Rodeo Games, and InterAlt – and have collectively amassed about 20,000 installs in the Chrome Web Store.

"All 108 route stolen credentials, user identities, and browsing data to servers controlled by the same operator," security researcher Kush Pandya said in an analysis.
Full Story:
 
Full Story:
This is a useful warning sign, but it still needs careful handling.

What the report claims

According to the article, 108 Chrome extensions are allegedly tied to the same operator and share command-and-control infrastructure.

The reported behavior includes:
  • Collecting browsing data
  • Stealing credentials or identity-related data
  • Injecting ads into pages
  • Injecting arbitrary JavaScript into visited websites

If that analysis is accurate, this is more than simple adware behavior. Browser-level script injection can become a serious security issue because it may affect sessions, page content, and potentially sensitive data entered into websites.

Important caution

I cannot independently verify from the article alone that every listed extension is malicious, and it is better not to assume safety or danger without checking the actual extension IDs, permissions, and technical indicators.

That said, a cluster of extensions sharing the same backend infrastructure is a legitimate red flag and worth taking seriously.

Practical impact

For affected users, the main risks would likely include:
  • Data collection beyond what users expect
  • Credential theft or session abuse
  • Ad injection and browser hijacking behavior
  • Website manipulation through injected JavaScript

Even if some extensions appear harmless on the surface, broad permissions combined with remote code-like behavior or server-driven scripting can make them dangerous.

Reasonable next steps

If anyone thinks they may have installed one of these extensions, the safest standard actions are:
  • Remove the extension from Chrome immediately
  • Review all installed extensions and delete anything unfamiliar or unnecessary
  • Change passwords for important accounts, especially email, banking, shopping, and password manager accounts
  • Enable or verify multi-factor authentication where possible
  • Run scans with reputable security software
  • Check saved passwords, autofill entries, and active browser sessions
  • Sign out of sensitive websites and sign back in after password changes

For validation, users should compare extension IDs and names against the list provided by the original researchers, not just the article summary.

Broader takeaway

This is also a good reminder that browser extensions deserve the same scrutiny as installed software.

A few sensible habits help reduce risk:
  • Keep only extensions that are truly necessary
  • Review requested permissions before installing
  • Prefer well-known developers with transparent documentation
  • Be cautious with extensions that request access to all websites
  • Re-check installed extensions periodically

The key takeaway is simple: if the technical findings hold up, this looks like a significant browser-extension abuse campaign and affected users should treat it as a possible account-security incident, not just an annoyance.
 
  • Like
Reactions: Halp2001
Great share, @Brownie2019. The worst part about these reports is they remind us that the risk isn't just limited to Chrome, but affects almost any modern browser (Edge, Brave, etc.) since they all share the same base.

To avoid relying solely on whether Google catches these extensions in time, I follow a few basic rules:

  • Install only the essentials: Before adding anything, ask yourself if you really need it. Many features are already native to the browser or can be replaced by a simple bookmark.
  • Check permissions: If an extension asks to "read and change all your data," be suspicious. That’s exactly the permission they use to inject ads and hijack sessions.
  • Monthly cleanup: Spend 5 minutes every month deleting anything you don't use. Fewer extensions mean a smaller attack surface.
  • Separate profiles: Use a "clean" profile for banking and sensitive tasks. My rule here is zero extensions, with specific security exceptions like uBlock Origin (or Lite) and a manager like Bitwarden. This keeps your critical accounts isolated from any other extension that might go rogue.
Ultimately, the best layer of security is our own browsing discipline. Thanks for the heads-up! 🛡️ 🌐
 
As above the fewer extensions you use the lower the risk, on this browser Wolf I have just one, uBlock Origin that's all, it does seem lately there are more issues with extensions than in the past??
I have decided to stick to either Brave or Vivaldi, regardless of their shortcoming, to avoid extension use; built-in adblocker (no need for uBOL) and enable dark webpage flag (no need for dark reader).
 
Status
Not open for further replies.