No Comments

More than 100 Chrome Extensions Target Users with Token Theft and Ad Fraud

Impreza's Character, Jake, Google Chrome logo Featured Image for Impreza News, made by Impreza Team, 2026.

More than 100 malicious extensions in the official Chrome Web Store actively attempt to steal Google OAuth2 Bearer tokens, deploy backdoors, and carry out ad fraud.

Meanwhile, researchers at application security company Socket uncovered that the malicious extensions form part of a coordinated campaign that relies on the same command-and-control (C2) infrastructure.

Furthermore, the threat actor published the extensions under five distinct publisher identities across multiple categories: Telegram sidebar clients, slot machine and Keno games, YouTube and TikTok enhancers, a text translation tool, and utilities.

According to the researchers, the campaign uses a central backend hosted on a Contabo VPS, while multiple subdomains actively handle session hijacking, identity collection, command execution, and monetization operations.

In addition, Socket identified evidence pointing to a Russian malware-as-a-service (MaaS) operation, based on comments found in the code for authentication and session theft.

Extensions linked to the same campaign
Extensions linked to the same campaign
Source: Socket

Breakdown of Malicious Extension Clusters

The largest cluster, comprising 78 extensions, injects attacker-controlled HTML directly into the user interface via the ‘innerHTML’ property.

Next, the second-largest group, with 54 extensions, uses ‘chrome.identity.getAuthToken’ to collect the victim’s email, name, profile picture, and Google account ID.

Moreover, these extensions steal the Google OAuth2 Bearer token, a short-lived access token that allows applications to access user data or act on their behalf.

Google account data harvesting
Google account data harvesting
Source: Socket

Additionally, a third batch of 45 extensions includes a hidden function that runs automatically on browser startup, acting as a backdoor that fetches commands from the C2 and can open arbitrary URLs. Notably, this function requires no user interaction.

One extension that Socket highlighted as “the most severe” steals Telegram Web sessions every 15 seconds, extracts session data from ‘localStorage’ along with the session token, and sends this information to the C2.

“The extension also handles an inbound message (set_session_changed) that performs the reverse operation: it clears the victim’s localStorage, overwrites it with threat actor-supplied session data, and force-reloads Telegram,” describes Socket.

“This allows the operator to swap any victim’s browser into a different Telegram account without the victim’s knowledge.”

Additional Malicious Behaviors Identified

Beyond that, researchers identified three extensions that strip security headers and inject ads into YouTube and TikTok, one that proxies translation requests through a malicious server, and a non-active Telegram session theft extension that relies on staged infrastructure.

Although Socket has already notified Google about the campaign, all malicious extensions remain available on the Chrome Web Store at the time of publishing the report.

At the same time, BleepingComputer confirms that many of the listed extensions still appear online. The outlet has contacted Google for comment but has not received a response yet.

Therefore, users should immediately review installed extensions, compare them against the IDs published by Socket, and uninstall any matches without delay.

 


Source: BleepingComputer,

Read more at Impreza News

You might also like

More Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.