Original Article Text

Click to Toggle View

Malicious extensions with 1.7M installs found on Chrome Web Store. Almost a dozen malicious extensions with 1.7 million downloads in Google's Chrome Web Store could track users, steal browser activity, and redirect to potentially unsafe web addresses. Most of the add-ons provide the advertised functionality and pose as legitimate tools like color pickers, VPNs, volume boosters, and emoji keyboards. Researchers at Koi Security, a company providing a platform for security self-provisioned software, discovered the malicious extensions in Chrome Web Store and reported them to Google. Some of the extensions are no longer present but many of them continue to be available. Many of those extensions are verified, have hundreds of positive reviews, and are featured prominently on the Chrome Web Store, misleading users about their safety. Users should check for the following add-ons in Chrome browser and remove them as soon as possible: One of them, ‘Volume Max — Ultimate Sound Booster,’ has also been flagged by LayerX researchers last month, who warned about its potential for spying on users; but no malicious activity could be confirmed at the time. According to the researchers, the most of the malicious functionality is implemented in the background service worker of each extension using the Chrome Extensions API, registering a listener that is triggered every time a user navigates to a new webpage. The listener captures the URL of the visited page and exfiltrates the information to a remote server along with a unique tracking ID for each user. The server can respond with redirection URLs, hijacking the user’s browsing activity and potentially taking them to unsafe destinations that may enable cyberattacks. Although the possibility is there, it should be noted that Koi Security has not observed malicious redirections in their testing. Furthermore, the malicious code was not present in the initial versions of the extensions, but was introduced at a later time via updates. Google’s auto-update system silently deploys the newest versions to users without requiring any user approval or interaction. Given that some of these extensions were safe for years, it is possible that they were hijacked/compromised by external actors who introduced the malicious code. BleepingComputer contacted several publishers to inquire about this possibility, but we have not yet heard back from any of them. Before publishing this article, Koi Security researchers discovered that cybercriminals have also planted malicious extensions in the official store for Microsoft Edge, which shows a total count of 600,000 downloads. "Combined, these eighteen extensions have infected over 2.3 million users across both browsers, creating one of the largest browser hijacking operations we’ve documented," the researchers say. They recommend users remove all listed extensions immediately, clear the browsing data to purge any tracking identifiers, check the system for malware, and monitor accounts for suspicious activity.  8 Common Threats in 2025 While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques. Drawing from Wiz's detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.

Daily Brief Summary

MALWARE // Malicious Chrome Extensions Impact Over 1.7 Million Users

Researchers found nearly a dozen malicious extensions in Google's Chrome Web Store, cumulatively downloaded 1.7 million times.

These extensions, disguised as legitimate tools like VPNs and emoji keyboards, could track users, steal browser activity, and redirect to potentially harmful URLs.

Some of the problematic extensions, such as ‘Volume Max — Ultimate Sound Booster,’ were previously flagged for suspicious activities but remained unconfirmed for malicious behavior until now.

The harmful functionalities, hidden in background service workers using the Chrome Extensions API, capture and exfiltrate user data to remote servers.

Despite the malicious updates, Google's auto-update feature deployed these versions without user interaction, raising concerns about silent update practices.

Extensions originally safe at launch may have been compromised over time, introducing malware through updates by potentially external actors.

Koi Security also discovered similar malicious extensions in the Microsoft Edge store, affecting an additional 600,000 downloads.

Recommendations include immediate removal of the identified extensions, clearing browser data, system malware checks, and monitoring for account irregularities.