Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1189
Drive-by Compromise (Browser Extension)
T1059.002
Command and Scripting Interpreter: JavaScript
T1562.001
Impair Defenses: Disable or Modify Tools (Stripping content-security-policy and x-xss-protection via declarativeNetRequest)
T1132.001
Data Encoding: Standard Encoding (Base64 data URI for 1x1 GIF)
CVE Profile
N/A [CISA KEV Status: Inactive]
(
Supply chain compromise of third-party software, not a native software vulnerability).
Telemetry
Extension ID
kdenlnncndfnhkognokgfpabgkgehodd
C2 Domain
api.extensionanalyticspro.top
SHA256
28c7fd959943c6d317d14f5cdafad842695d5dde65f8744442e565a0c9f3ddc3
Constraint
The structure resembles a classic XSS filter evasion technique. The extension injects a hidden <img> element with a base64 src URI and executes the remote C2 payload via an inline event handler (img.setAttribute("onload", element)).
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Institute an explicit allowlist policy for browser extensions and review third-party software supply chain risk management.
DETECT (DE) – Monitoring & Analysis
Command
Query EDR and network telemetry for DNS requests or HTTPS traffic directed to api.extensionanalyticspro.top.
Command
Hunt for Chromium extension ID kdenlnncndfnhkognokgfpabgkgehodd in local user AppData directories.
RESPOND (RS) – Mitigation & Containment
Command
Force-remove the offending extension ID via Group Policy Objects (GPO) or MDM extension blocklists for all managed browsers.
Command
Block network traffic to api.extensionanalyticspro.top at the secure web gateway or firewall level.
RECOVER (RC) – Restoration & Trust
Command
Instruct impacted users to log out and invalidate active web sessions, as the injected JavaScript execution context may have compromised active session tokens.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Restrict standard users from installing unapproved browser extensions, specifically those that require declarativeNetRequest or webRequest permissions.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately if you actively rely on QuickLens v5.8 to prevent further C2 polling.
Command
Do not log into banking/email until verified clean. Remove the extension labeled "QuickLens - Search Screen with Google Lens" from your browser immediately.
Priority 2: Identity
Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G). Because the payload ran in the context of your browser pages, active session cookies or entered credentials may have been stolen.
Priority 3: Persistence
Command
Navigate to chrome://extensions/ and manually delete any extension with the ID kdenlnncndfnhkognokgfpabgkgehodd.
Hardening & References
Baseline
CIS Benchmarks for Google Chrome (Section 1.3: Extension Management).
Framework
NIST CSF 2.0 / SP 800-61r3.
Style
Review OWASP XSS Filter Evasion cheat sheets to understand the mechanics behind the hidden onload pixel trick.
Source
Pixel Perfect: Sold Extension Injects Code Through Pixel