Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extensions Compromise VKontakte Users

Malicious Chrome Extensions Compromise VKontakte Users

Posted on February 13, 2026 By CWS

Over 500,000 users of VKontakte, Russia’s largest social networking platform, have been targeted by a sophisticated malware campaign via Chrome extensions. These seemingly innocuous extensions have been covertly hijacking user accounts, posing as harmless customization tools for the platform.

Malicious Extensions and Account Hijacking

The extensions, masquerading as VKontakte customization tools, secretly subscribe users to groups managed by attackers, modify account settings every 30 days, and exploit security tokens to maintain ongoing control. This operation, initially mistaken for simple theme customization, is a multi-stage account takeover scheme.

The campaign involves five Chrome extensions connected through a malicious infrastructure, with the most significant, “VK Styles,” reaching 400,000 installations before being removed. These extensions utilize a VKontakte profile as command-and-control infrastructure, evading traditional security scans by hiding payload URLs within HTML metadata tags.

Advanced Malware Delivery Techniques

Researchers from Koi uncovered this threat while analyzing extensions injecting Yandex advertising scripts. The malware uses dynamic metric identifiers to avoid pattern matching by security tools. Obfuscated JavaScript functions in the extensions execute arbitrary code fetched from a GitHub repository controlled by the threat actor known as “2vk.”

The malware’s infection strategy showcases advanced evasion tactics. Upon installation, the extensions inject code into every VK page visited, retrieving encoded instructions from the attacker’s VK profile metadata. This directs the extensions to download additional payloads from GitHub, allowing the threat actor to update malicious functionalities without altering the extension code itself.

Security Implications and Recommendations

The malware manipulates VKontakte’s security mechanisms, such as CSRF protection cookies, to bypass restrictions on unauthorized account actions. It automatically subscribes victims to the attacker’s VK group with a 75% likelihood during each session, establishing a self-propagating distribution network. Every 30 days, it resets account settings to override user preferences, ensuring prolonged control.

This operation, active from June 2025 to January 2026, saw continuous development and feature enhancements over seven months. Security professionals are advised to audit browser extensions, monitor for unusual activity in VK APIs, and enforce extension allowlisting policies.

Users noticing unexpected group subscriptions or changes in settings should promptly remove suspicious VK-related extensions and reevaluate their Chrome extension permissions.

For more updates, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source in Google.

Cyber Security News Tags:account hijacking, browser security, Chrome extensions, Chrome Web Store, Cybersecurity, GitHub, JavaScript, Malware, security breach, security tokens, social network, VK Styles, VKontakte

Post navigation

Previous Post: CISA Alerts on Active Exploitation of Major Software Vulnerabilities
Next Post: Google Tackles AI Threats, Disney Faces Privacy Fine

Related Posts

Eurofiber Data Breach – Hackers Exploited Vulnerability to Exfiltrate Users’ Data Eurofiber Data Breach – Hackers Exploited Vulnerability to Exfiltrate Users’ Data Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025 CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025 Cyber Security News
DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs Cyber Security News
Operation DreamJob Attacking Manufacturing Industries Using Job-related WhatsApp Web Message Operation DreamJob Attacking Manufacturing Industries Using Job-related WhatsApp Web Message Cyber Security News
CISA Demands Removal of Outdated Network Devices CISA Demands Removal of Outdated Network Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Linked to Malware Attacks on Ukraine
  • XWorm RAT Campaign Evades Detection with Excel Exploit
  • UAT-9921 Targets Tech and Finance with VoidLink Malware
  • OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes
  • StealC Malware Targets Windows via Fake CAPTCHA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Linked to Malware Attacks on Ukraine
  • XWorm RAT Campaign Evades Detection with Excel Exploit
  • UAT-9921 Targets Tech and Finance with VoidLink Malware
  • OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes
  • StealC Malware Targets Windows via Fake CAPTCHA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News