Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Identifies Fake AI Extensions Breaching Enterprises

Microsoft Identifies Fake AI Extensions Breaching Enterprises

Posted on March 9, 2026 By CWS

A surge of counterfeit AI-driven browser extensions has infiltrated over 20,000 enterprise environments, jeopardizing the chat histories of employees who rely on AI tools for professional tasks.

Widespread Installation and Data Compromise

These fraudulent extensions, based on the Chromium platform, were deceptively presented as legitimate AI assistants and amassed nearly 900,000 installations before being detected. They posed as genuine productivity tools while secretly collecting sensitive data.

The extensions particularly targeted users of renowned AI platforms such as ChatGPT and DeepSeek, extracting complete conversation logs, visited URLs, and browsing telemetry from active sessions. Employees frequently using these platforms shared internal codes and strategic plans, all of which were covertly captured and sent to attacker-controlled servers.

Detection and Distribution Tactics

Microsoft Defender analysts uncovered the campaign after detecting unusual outbound connections linked to browser extensions across enterprise systems. Attackers meticulously studied legitimate extensions, including one known as AITOPIA, replicating its branding and user interface, allowing the malicious versions to bypass standard checks.

Distributed via the Chrome Web Store, these extensions exploited its reputation for security. Given that Microsoft Edge supports Chromium-based extensions, a single malicious listing could affect users on both browsers. Automatic downloads on some browsers further extended the campaign’s reach.

Stealthy Data Harvesting Techniques

Upon installation, these extensions activated background scripts to log visited URLs and AI chat content without user intervention. The permissions model of Chromium granted access to nearly all pages, including internal corporate sites, enabling extensive data collection.

Data was stored locally in Base64-encoded JSON format and transmitted at set intervals to avoid detection. The extensions used HTTPS POST requests to send data to domains like deepaichats[.]com and chatsaigpt[.]com, blending with regular web traffic.

Preventive Measures for Organizations

Organizations are urged to audit browser extensions across their networks and remove any with unknown IDs, especially those implicated in this campaign. Monitoring outbound POST traffic to suspicious domains can help identify affected devices.

Implementing extension allowlisting through browser management platforms and enhancing network protection to block known command and control endpoints are effective strategies. Educating employees to review and remove unfamiliar extensions is essential for safeguarding sensitive information.

Stay informed with updates by following us on Google News, LinkedIn, and X, and set CSN as a preferred source on Google.

Cyber Security News Tags:AI security, browser extensions, Chromium extensions, Cybersecurity, data protection, enterprise data breach, fake extensions, IT management, Microsoft, network security

Post navigation

Previous Post: Phishing Exploits .arpa TLD in DNS Vulnerabilities
Next Post: Security Platforms: A Solution for Mid-Market Needs

Related Posts

Malicious Outlook Add-in Exposes 4,000 Accounts Malicious Outlook Add-in Exposes 4,000 Accounts Cyber Security News
706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online 706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online Cyber Security News
Tesla’s Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root Tesla’s Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root Cyber Security News
EVALUSION Campaign Using ClickFix Technique to deploy Amatera Stealer and NetSupport RAT EVALUSION Campaign Using ClickFix Technique to deploy Amatera Stealer and NetSupport RAT Cyber Security News
AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks Cyber Security News
Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains
  • Microsoft 365 Introduces Copilot Cowork for Task Automation
  • ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users
  • New ClickFix Variant Exploits Windows Terminal
  • Security Platforms: A Solution for Mid-Market Needs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains
  • Microsoft 365 Introduces Copilot Cowork for Task Automation
  • ClipXDaemon: A New C2-Less Threat to Linux Cryptocurrency Users
  • New ClickFix Variant Exploits Windows Terminal
  • Security Platforms: A Solution for Mid-Market Needs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News