Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users

Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users

Posted on January 7, 2026January 7, 2026 By CWS

Two rogue Chrome extensions have compromised over 900,000 customers by secretly exfiltrating ChatGPT and DeepSeek conversations, together with full searching histories, to attacker servers.

Found by OX Safety researchers, the malware impersonates the respectable AITOPIA AI sidebar software, with one faux even incomes Google’s “Featured” badge.

The OX Analysis group recognized the menace throughout routine evaluation, revealing extensions that clone AITOPIA’s interface for chatting with LLMs like GPT and Claude.

Named “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” (600K+ customers, ID: fnmihdojmnkclgjpcoonokmkhjpjechg, model 1.9.6) and “AI Sidebar with Deepseek, ChatGPT, Claude and extra” (300K+ customers, ID: inhcgfpbfdjbjogdfjbclgolkmhnooop), they request “nameless analytics” consent to masks knowledge theft.

Risk actors host privateness insurance policies on Lovable.dev to obscure origins, and uninstalled extensions redirect to the opposite.

How the Malware Operates

Put in extensions monitor tabs by way of chrome.tabs.onUpdated API, producing a novel “gptChatId” per sufferer. On detecting chatgpt.com or deepseek.com URLs, they scrape DOM parts for prompts, responses, and session IDs, storing knowledge domestically earlier than Base64-encoding and sending batches to C2 servers like deepaichats.com or chatsaigpt.com each half-hour.

This captures proprietary code, enterprise methods, PII, search queries, and inside URLs missed by AITOPIA’s disclosed server storage.​

Stolen chats threat exposing mental property, company secrets and techniques, and private knowledge for espionage or sale on darkish internet boards. Searching logs reveals habits, tokens, and org constructions, enabling phishing or id theft throughout affected enterprises.

As of January 7, 2026, each extensions stay downloadable, with the primary stripped of its “Featured” standing post-disclosure however up to date as not too long ago as October 2025.​

Customers ought to go to chrome://extensions, take away by ID, or use retailer pages: ChatGPT extension, AI Sidebar. Keep away from unverified extensions no matter badges; stick with respected sources.

IoCs

TypeValueNotesExtension nameChat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AIMalicious AI sidebar-style extensionExtension IDfnmihdojmnkclgjpcoonokmkhjpjechgChrome Net Retailer IDVersion1.9.6Reported malicious buildSHA-256 hash98d1f151872c27d0abae3887f7d6cb6e4ce29e99ad827cb077e1232bc4a69c00Package hashExtension nameAI Sidebar with Deepseek, ChatGPT, Claude and moreSecond malicious extensionExtension IDinhcgfpbfdjbjogdfjbclgolkmhnooopChrome Net Retailer IDVersion1.6.1Reported malicious buildSHA-256 hash20ba72e91d7685926c8c1c5b4646616fa9d769e32c1bc4e9f15dddaf3429cea7Package hash

Community and C2 IoCs

CategoryDomain / EndpointNotesC2 endpointdeepaichats[.]comReceives stolen chat knowledge and URLsC2 endpointchatsaigpt[.]comAdditional C2 for exfiltrated dataLovable-hosted serverchataigpt[.]proUsed for privateness coverage / infra hostingLovable-hosted serverchatgptsidebar[.]proUsed for uninstall redirect and infra

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:900k, ChatGPT, Chrome, Conversations, DeepSeek, Extension, Malicious, Steal, Users

Post navigation

Previous Post: Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users
Next Post: Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers

Related Posts

Fortra GoAnywhere Vulnerability Exploited as 0-day Before Patch Released Fortra GoAnywhere Vulnerability Exploited as 0-day Before Patch Released Cyber Security News
Microsoft’s Critical Windows 11 Updates Enhance Security Microsoft’s Critical Windows 11 Updates Enhance Security Cyber Security News
Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access Cyber Security News
10 Best Cyber Attack Maps 10 Best Cyber Attack Maps Cyber Security News
Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS Cyber Security News
PoC Exploit Released for Critical Outlook 0-Click Remote Code Execution Vulnerability PoC Exploit Released for Critical Outlook 0-Click Remote Code Execution Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News