Article Details
Scrape Timestamp (UTC): 2025-07-08 19:17:02.527
Source: https://www.theregister.com/2025/07/08/browser_hijacking_campaign/
Original Article Text
Click to Toggle View
Massive browser hijacking campaign infects 2.3M Chrome, Edge users. These extensions weren't malware-laced from the start, researcher says. A Chrome and Edge extension with more than 100,000 downloads that displays Google's verified badge does what it purports to do: It delivers a color picker to users. Unfortunately, it also hijacks every browser session, tracks activities across websites, and backdoors victims' web browsers, according to Koi Security researchers. Color pickers let users select any color from a website and copy it into a clipboard for later use - helpful for designing apps, websites, and the like. This particular extension from Geco is still available for download via both Microsoft's and Google's respective stores at press time. Neither company responded to The Register's inquiries, but we will update this story if that changes. The Geco extension has more than 800 reviews on the Chrome Web Store, 4.2 stars (out of 5), and "featured" placement. Microsoft's Edge Add-ons shows similarly glowing write-ups from its 1,000-plus users, and it looks like a perfectly safe extension. "This isn't some obvious scam extension thrown together in a weekend," said Koi Security analyst Idan Dardikman in a Tuesday blog. "This is a carefully crafted Trojan horse." The Register also reached out to the developer for comment but did not receive a response. The Geco color picker, according to Koi Security, is "just the tip of the iceberg," and part of a much larger browser-hijacking campaign dubbed RedDirection. The campaign consists of 18 malicious extensions spanning both Chrome and Edge stores that all share the same snooping capabilities. All 18 extensions are listed at the bottom of this story. "Combined, these eighteen extensions have infected over 2.3 million users across both browsers, creating one of the largest browser hijacking operations we've documented," Dardikman wrote. The extensions offer all sorts of capabilities: emoji keyboards, weather forecasts, video speed controllers, VPN proxies for Discord and TikTok, dark themes, volume boosters, and YouTube unblockers (useful if your employer, school, or government blocks the popular video site). But in addition to providing these legitimate functions, they secretly surveil users' web browsing activity, capturing URLs, sending this info to a remote attacker-controlled server along with the victim's unique tracking ID, and even redirecting people's browsers if instructed, according to the researchers. What makes this even sneakier — and likely explains the Google verified badge — is that these extensions weren't laced with malware from the start. According to Dardikman, the code started out clean and sometimes remained that way for years before the malware was introduced during version updates. "Due to how Google and Microsoft handle browser extension updates, these malicious versions auto-installed silently for over 2.3 million users across both platforms, most of whom never clicked anything," he said. If you've installed any of the extensions listed below, uninstall now, clear your browser data, and keep an eye on your accounts for any suspicious activity. Extension IDs Chrome: Edge: "No phishing. No social engineering. Just trusted extensions with quiet version bumps that turned productivity tools into surveillance malware," the blog warns.
Daily Brief Summary
A massive browser hijacking campaign has targeted users of Chrome and Edge through malicious extensions, affecting over 2.3 million users.
Initially harmless, these browser extensions, including a popular color picker from Geco, were later updated with malware that enabled surveillance and data theft.
These extensions, despite performing their stated functions such as color selection, covertly tracked user activity, captured URLs, and could redirect browsers to attacker-specified sites.
Koi Security researchers discovered the campaign, dubbed RedDirection, which includes 18 different malicious extensions available in both the Chrome Web Store and Microsoft's Edge Add-ons.
The malware functionality in these extensions was not present from the beginning; instead, it was inserted during subsequent updates, which were automatically installed without users' interaction.
The affected extensions offer various utilities like emoji keyboards, weather forecasts, and VPN services but secretly perform background activities that compromise users’ privacy.
Investigations into the incident are ongoing, and neither Google nor Microsoft has yet responded to inquiries regarding how these extensions passed their security checks.