Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extensions Target Google and Telegram Data

Malicious Chrome Extensions Target Google and Telegram Data

Posted on April 14, 2026 By CWS

In a recent cybersecurity alert, experts have uncovered a disturbing scheme involving a total of 108 Google Chrome extensions designed to harvest user data and abuse browser functionalities. These extensions, which have been installed approximately 20,000 times from the Chrome Web Store, communicate with a centralized command-and-control (C2) infrastructure to execute their malicious activities, including the injection of advertisements and arbitrary JavaScript code into visited websites.

Extension Identities and Distribution

The extensions are attributed to five different publishers: Yana Project, GameGen, SideGames, Rodeo Games, and InterAlt. Despite their varied appearances, all extensions share the same backend and are part of a coordinated effort to compromise user data. Kush Pandya, a security researcher, highlighted that these extensions transmit credentials, user identities, and browsing information to servers controlled by a single operator.

Among the 108 extensions, 54 specifically target Google account identities using OAuth2, while 45 possess a universal backdoor that triggers the opening of arbitrary URLs upon browser startup. The rest partake in various malicious acts, such as exfiltrating Telegram Web sessions every 15 seconds and manipulating security headers on YouTube and TikTok to insert gambling ads.

Deceptive Appearances and Functions

To appear legitimate, these extensions pose as utilities and tools such as Telegram sidebar clients, slot machine games, video platform enhancers, and text translators. However, unbeknownst to users, they run harmful code in the background to capture session details, inject scripts, and navigate to URLs chosen by the attackers.

Notable extensions include ‘Telegram Multi-account,’ which exfiltrates Telegram Web user_auth tokens, and ‘Web Client for Telegram – Teleside,’ which modifies Telegram’s security headers to steal sessions. Another, ‘Formula Rush Racing Game,’ captures Google account details during user sign-in attempts.

Security Implications and Recommendations

Security researcher Socket has noted that five of these extensions use Chrome’s declarativeNetRequest API to strip security headers, thus enabling their malicious activities before a webpage fully loads. All identified extensions have a backend hosted at the IP address 144.126.135[.]238, although the developers’ identities remain unknown. Insights from source code analysis point to possible Russian origins, as indicated by language comments found in several extensions.

Users who have downloaded any of these extensions are strongly advised to uninstall them immediately and to log out of all active Telegram Web sessions via the mobile application to safeguard their accounts.

In conclusion, this incident underscores the persistent threat of malicious browser extensions. Users are encouraged to remain vigilant, review extension permissions regularly, and install only trusted and verified browser add-ons. Continuous monitoring and swift response are essential to mitigate the risks posed by such cyber threats.

The Hacker News Tags:ad injection, browser add-ons, browser security, C2 infrastructure, Chrome extensions, Cybersecurity, data theft, Google, internet safety, JavaScript, Malware, OAuth2, online privacy, security threats, Telegram

Post navigation

Previous Post: CISA Highlights Six Exploited Flaws in Major Software
Next Post: RCI Hospitality Faces Data Breach Exposing Sensitive Info

Related Posts

Why IT Leaders Must Rethink Backup in the Age of Ransomware Why IT Leaders Must Rethink Backup in the Age of Ransomware The Hacker News
Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China The Hacker News
APT28’s New PRISMEX Malware Campaign Targets Ukraine APT28’s New PRISMEX Malware Campaign Targets Ukraine The Hacker News
Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction The Hacker News
Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances The Hacker News
Security Flaws in AI Tool Pose Major Risks Security Flaws in AI Tool Pose Major Risks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Alerts on Critical Windows and Adobe Vulnerabilities
  • AI Scam Targets Google Discover with Fake News
  • Mirax Android Malware Poses Dual Threat to Users
  • Google Enhances Pixel Security with Rust DNS Parser
  • Google Integrates Rust DNS Parser in Pixel 10 for Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Alerts on Critical Windows and Adobe Vulnerabilities
  • AI Scam Targets Google Discover with Fake News
  • Mirax Android Malware Poses Dual Threat to Users
  • Google Enhances Pixel Security with Rust DNS Parser
  • Google Integrates Rust DNS Parser in Pixel 10 for Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark