Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extensions Threaten Business Security

Malicious Chrome Extensions Threaten Business Security

Posted on February 13, 2026 By CWS

Recent findings by cybersecurity experts have unveiled a dangerous Google Chrome extension that targets business data, posing significant risks to companies utilizing Meta Business Suite and Facebook Business Manager. This extension, known as CL Suite by @CLMasters, is deceptively marketed as a tool to aid in data management and two-factor authentication (2FA) generation. Despite its seemingly useful features, the extension is designed to extract sensitive information without user consent, raising alarms in the cybersecurity community.

Unveiling the Threat

The CL Suite extension, which first appeared on the Chrome Web Store in March 2025, has been identified as a tool for unauthorized data collection. Although it claims to enhance user experience by removing verification pop-ups and managing 2FA codes, it secretly exfiltrates time-based one-time password (TOTP) codes and business analytics to a server controlled by the threat actor. The extension’s privacy policy misleadingly suggests that data remains local, but in reality, it transmits sensitive information to external servers.

Security researcher Kirill Boychenko has highlighted the extension’s ability to collect and forward data, including Meta Business ‘People’ CSV exports and analytics, to a backend server at getauth[.]pro. The extension even has the capability to send this data to a Telegram channel operated by the attackers. This stealthy data scraping is a significant concern for businesses relying on Meta’s platforms for operations.

Broader Implications and Similar Threats

This threat is not isolated. A similar campaign, dubbed VK Styles, has been discovered, targeting VKontakte users. This large-scale attack involves Chrome extensions that manipulate VK accounts, demonstrating the versatility and reach of such malicious tools. The attackers use these extensions to force user subscriptions to VK groups, alter account settings, and bypass security measures, all while maintaining persistent control over the targeted accounts.

More concerning is the revelation of another campaign involving AI-themed browser extensions. These extensions, masquerading as AI assistants for various tasks, have been installed by over 260,000 users. They exploit their perceived utility to siphon sensitive data, including browsing history and Gmail content, by embedding remote-controlled interfaces that bypass Chrome’s security protocols.

Security Recommendations and Future Outlook

With the increasing sophistication of browser extensions as tools for cyber threats, it is crucial for users and organizations to exercise caution. Experts advise minimizing extension installations, regularly auditing installed extensions, and ensuring they come from reputable sources. Implementing separate browser profiles for sensitive tasks and employing allowlisting strategies can also mitigate risks.

The growing trend of malicious browser extensions highlights the need for heightened awareness and improved security measures. As attackers continue to exploit these tools for data exfiltration, both users and developers must remain vigilant to protect sensitive information from unauthorized access.

The Hacker News Tags:AI extensions, browser security, browsing history, Chrome extensions, cyber threat, Cybersecurity, data brokers, data exfiltration, data security, email security, Facebook Business Manager, Meta Business Suite, VKontakte

Post navigation

Previous Post: Data Breach at Dutch Carrier Odido Affects Millions
Next Post: Check Point Boosts AI Security with New Acquisitions

Related Posts

Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats The Hacker News
Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems The Hacker News
Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data The Hacker News
Why It Needs a Modern Approach Why It Needs a Modern Approach The Hacker News
APT36 and SideCopy Target Indian Defense with RATs APT36 and SideCopy Target Indian Defense with RATs The Hacker News
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • StealC Malware Targets Windows via Fake CAPTCHA
  • Google Tackles AI Threats, Disney Faces Privacy Fine
  • Malicious Chrome Extensions Compromise VKontakte Users
  • CISA Alerts on Active Exploitation of Major Software Vulnerabilities
  • Zimbra Enhances Security with Critical Update

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • StealC Malware Targets Windows via Fake CAPTCHA
  • Google Tackles AI Threats, Disney Faces Privacy Fine
  • Malicious Chrome Extensions Compromise VKontakte Users
  • CISA Alerts on Active Exploitation of Major Software Vulnerabilities
  • Zimbra Enhances Security with Critical Update

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News