Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extensions Compromise VKontakte Users

Malicious Chrome Extensions Compromise VKontakte Users

Posted on February 13, 2026 By CWS

Over 500,000 users of VKontakte, Russia’s largest social networking platform, have been targeted by a sophisticated malware campaign via Chrome extensions. These seemingly innocuous extensions have been covertly hijacking user accounts, posing as harmless customization tools for the platform.

Malicious Extensions and Account Hijacking

The extensions, masquerading as VKontakte customization tools, secretly subscribe users to groups managed by attackers, modify account settings every 30 days, and exploit security tokens to maintain ongoing control. This operation, initially mistaken for simple theme customization, is a multi-stage account takeover scheme.

The campaign involves five Chrome extensions connected through a malicious infrastructure, with the most significant, “VK Styles,” reaching 400,000 installations before being removed. These extensions utilize a VKontakte profile as command-and-control infrastructure, evading traditional security scans by hiding payload URLs within HTML metadata tags.

Advanced Malware Delivery Techniques

Researchers from Koi uncovered this threat while analyzing extensions injecting Yandex advertising scripts. The malware uses dynamic metric identifiers to avoid pattern matching by security tools. Obfuscated JavaScript functions in the extensions execute arbitrary code fetched from a GitHub repository controlled by the threat actor known as “2vk.”

The malware’s infection strategy showcases advanced evasion tactics. Upon installation, the extensions inject code into every VK page visited, retrieving encoded instructions from the attacker’s VK profile metadata. This directs the extensions to download additional payloads from GitHub, allowing the threat actor to update malicious functionalities without altering the extension code itself.

Security Implications and Recommendations

The malware manipulates VKontakte’s security mechanisms, such as CSRF protection cookies, to bypass restrictions on unauthorized account actions. It automatically subscribes victims to the attacker’s VK group with a 75% likelihood during each session, establishing a self-propagating distribution network. Every 30 days, it resets account settings to override user preferences, ensuring prolonged control.

This operation, active from June 2025 to January 2026, saw continuous development and feature enhancements over seven months. Security professionals are advised to audit browser extensions, monitor for unusual activity in VK APIs, and enforce extension allowlisting policies.

Users noticing unexpected group subscriptions or changes in settings should promptly remove suspicious VK-related extensions and reevaluate their Chrome extension permissions.

For more updates, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source in Google.

Cyber Security News Tags:account hijacking, browser security, Chrome extensions, Chrome Web Store, Cybersecurity, GitHub, JavaScript, Malware, security breach, security tokens, social network, VK Styles, VKontakte

Post navigation

Previous Post: CISA Alerts on Active Exploitation of Major Software Vulnerabilities
Next Post: Google Tackles AI Threats, Disney Faces Privacy Fine

Related Posts

OpenAI Releases GPT-5.1-Codex-Max that Performs Coding Tasks Independently OpenAI Releases GPT-5.1-Codex-Max that Performs Coding Tasks Independently Cyber Security News
Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Cyber Security News
ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine Cyber Security News
New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads Cyber Security News
SonicWall SMA100 Series N-day Vulnerabilities Technical Details Revealed SonicWall SMA100 Series N-day Vulnerabilities Technical Details Revealed Cyber Security News
Breaking Message Queuing (MSMQ) Functionality Affects IIS Sites Breaking Message Queuing (MSMQ) Functionality Affects IIS Sites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rundll32 and WebDAV: New ClickFix Variant Evades Detection
  • OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability
  • Top AWS Monitoring Tools for Optimal Cloud Performance
  • North Korean IT Operative’s Elaborate Job Scam Exposed
  • DeepLoad Malware Exploits ClickFix for Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rundll32 and WebDAV: New ClickFix Variant Evades Detection
  • OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability
  • Top AWS Monitoring Tools for Optimal Cloud Performance
  • North Korean IT Operative’s Elaborate Job Scam Exposed
  • DeepLoad Malware Exploits ClickFix for Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark