Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome, Edge Extensions Caught Stealing ChatGPT Sessions

Chrome, Edge Extensions Caught Stealing ChatGPT Sessions

Posted on January 27, 2026January 27, 2026 By CWS

A menace actor has created 16 browser extensions to steal customers’ ChatGPT periods and printed them to the official Chrome and Edge shops, LayerX stories.

Banking on the elevated adoption of AI-powered browser extensions that fulfill customers’ productiveness wants, the menace actor printed 15 extensions to the Chrome Net Retailer and one to the Microsoft Edge Add-ons market.

Marketed as ChatGPT enhancement and productiveness instruments, the extensions have a mixed obtain rely of over 900, they usually had been nonetheless out there by means of the official marketplaces as of January 26, LayerX says.

The instruments had been designed to intercept customers’ ChatGPT session authentication tokens and ship them to a distant server, however they don’t exploit ChatGPT vulnerabilities to take action.

As a substitute, they inject a content material script into chatgpt.com and execute it within the MAIN JavaScript world.

The script screens outbound requests initialized by the net utility, to establish and extract authorization headers and ship them to a second content material script, which exfiltrates them to the distant server.Commercial. Scroll to proceed studying.

“This method permits the extension operator to authenticate to ChatGPT companies utilizing the sufferer’s lively session and procure all customers’ historical past chats and connectors,” LayerX notes.

The cybersecurity firm explains that the content material scripts within the MAIN JavaScript allow the attacker to work together straight with the web page’s native runtime, as an alternative of counting on the browser’s content-script atmosphere.

The analyzed extensions had been additionally seen exfiltrating extension metadata, utilization telemetry and occasion information, and entry tokens issued by the backend and utilized by the extension service.

“This information permits the attacker to additional broaden entry tokens and allows persistent consumer identification, behavioral profiling, and long-lived entry to third-party companies,” LayerX says.

Based mostly on using a shared codebase, writer traits, and comparable icons, branding, and descriptions, the cybersecurity agency believes a single menace actor is behind all 16 extensions.

“By combining MAIN-world execution with authentication token interception, the operators obtained persistent entry to consumer accounts whereas remaining inside the boundaries of normal net habits. Such strategies are notably troublesome to detect utilizing conventional endpoint or community safety instruments,” LayerX notes.

Associated: ‘Stanley’ Malware Toolkit Permits Phishing through Web site Spoofing

Associated: Anthropic MCP Server Flaws Result in Code Execution, Knowledge Publicity

Associated: Chainlit Vulnerabilities Could Leak Delicate Data

Associated: Weaponized Invite Enabled Calendar Knowledge Theft through Google Gemini

Security Week News Tags:Caught, ChatGPT, Chrome, Edge, Extensions, Sessions, Stealing

Post navigation

Previous Post: Prioritization, Validation, and Outcomes That Matter
Next Post: Cyber Insights 2026: Quantum Computing and the Potential Synergy With Advanced AI

Related Posts

House Panel Advances Bills to Enhance Energy Cybersecurity House Panel Advances Bills to Enhance Energy Cybersecurity Security Week News
Australian Man Sentenced to Prison for Wi-Fi Attacks at Airports and on Flights Australian Man Sentenced to Prison for Wi-Fi Attacks at Airports and on Flights Security Week News
Inside the 1 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next Security Week News
New Insights on Optimizing KEV Catalog Usage for Security New Insights on Optimizing KEV Catalog Usage for Security Security Week News
Cyber Insights 2026: Offensive Security; Where It is and Where Its Going Cyber Insights 2026: Offensive Security; Where It is and Where Its Going Security Week News
Why Identity Security Must Move Beyond MFA Why Identity Security Must Move Beyond MFA Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News