Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake AI Chrome Extensions Compromise Over 260,000 Users

Fake AI Chrome Extensions Compromise Over 260,000 Users

Posted on February 13, 2026 By CWS

A recent cybersecurity threat has emerged, involving malicious Chrome extensions masquerading as popular AI tools such as ChatGPT, Claude, Gemini, and Grok. These deceptive extensions, installed by over 260,000 users, employ remote-controlled iframes to conduct surveillance.

Widespread Impact Through Deceptive Extensions

Security experts have identified at least 30 Chrome extensions advertised as AI assistants for activities like summarization, chatting, translation, image creation, and email productivity. Despite differing in appearance and branding, these extensions share a common codebase and infrastructure, confirming a coordinated campaign.

Some of these malicious extensions were even labeled as ‘Featured’ on the Chrome Web Store, enhancing their legitimacy and download rates. This tactic has significantly contributed to the widespread distribution and installation of these harmful tools.

Technical Insights and Strategy

Attackers utilize a method known as ‘extension spraying,’ where a removed extension is swiftly replaced by a clone with a new name and ID. Instead of running AI functionalities natively, these extensions load a full-screen iframe from attacker-controlled domains like tapnetic[.]pro. This setup allows operators to modify functionality remotely without updating the Chrome Web Store version.

Once installed, these extensions can extract readable content from active browser tabs, capture voice input via the Web Speech API, and track installation metrics through hidden telemetry. A specific set of 15 extensions focuses on Gmail, injecting scripts to monitor and collect visible email content.

Protective Measures and Recommendations

All identified extensions communicate with domains under tapnetic[.]pro and onlineapp[.]pro, with themed subdomains linking back to a central backend system. When a high-install extension was removed in February 2025, an identical version reappeared quickly, illustrating the attackers’ persistence and adaptability.

To safeguard against these threats, cybersecurity experts recommend auditing AI-branded Chrome extensions within networks, monitoring for unusual iframe injections, and keeping an eye on outbound traffic to suspicious domains. Prioritizing runtime monitoring over static reviews can also enhance defensive measures.

Organizations should approach AI-themed browser extensions cautiously, implementing strict management policies to prevent potential breaches. Stay informed by following cybersecurity updates on platforms like Google News, LinkedIn, and X.

Cyber Security News Tags:AI, browser security, Chrome extensions, cyber threats, Cybersecurity, data breach, IFrame Injection, malicious extensions, online security, security research

Post navigation

Previous Post: Russian Group Linked to Malware Attacks on Ukraine
Next Post: Global Cyber Threats Target Defense Sector Amid Rising Tensions

Related Posts

Google API Keys Risk Exposure to Private Data Google API Keys Risk Exposure to Private Data Cyber Security News
Samourai Wallet Cryptocurrency Mixing Founders Jailed for Laundering Over 7 Million Samourai Wallet Cryptocurrency Mixing Founders Jailed for Laundering Over $237 Million Cyber Security News
Browser Extensions Pose AI Data Theft Risk Browser Extensions Pose AI Data Theft Risk Cyber Security News
Apple’s Urgent iOS 15.8.7 Update Counters Exploit Threat Apple’s Urgent iOS 15.8.7 Update Counters Exploit Threat Cyber Security News
Microsoft To Depreciate VBScript In Windows Warns Developers To Adapt Their Projects Microsoft To Depreciate VBScript In Windows Warns Developers To Adapt Their Projects Cyber Security News
German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Supply Chain Attack Targets Axios NPM Packages
  • BlankGrabber Stealer Conceals Malware with Fake Certificates
  • Critical Vulnerability in Open VSX Exposes Users to Risk
  • TA446 Hackers Unleash DarkSword Kit on iOS Devices
  • Rundll32 and WebDAV: New ClickFix Variant Evades Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Supply Chain Attack Targets Axios NPM Packages
  • BlankGrabber Stealer Conceals Malware with Fake Certificates
  • Critical Vulnerability in Open VSX Exposes Users to Risk
  • TA446 Hackers Unleash DarkSword Kit on iOS Devices
  • Rundll32 and WebDAV: New ClickFix Variant Evades Detection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark