Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extensions Compromise User Data

Malicious Chrome Extensions Compromise User Data

Posted on April 15, 2026 By CWS

Recent findings by cybersecurity firm Socket have uncovered a significant threat posed by malicious Chrome extensions. Over 20,000 users have unknowingly installed these harmful extensions, which are designed to create backdoors, steal sensitive information, or inject unwanted advertisements into web pages.

Coordinated Campaign Revealed

The malicious extensions have been distributed through five separate accounts: GameGen, InterAlt, SideGames, Rodeo Games, and Yana Project. Despite the use of different accounts, these extensions share a common command-and-control (C&C) infrastructure, suggesting a coordinated effort. In total, Socket has identified 108 extensions engaging in a variety of malicious activities.

In-depth Malicious Activities

Half of the identified extensions were specifically designed to compromise Google accounts by exploiting OAuth2. Meanwhile, 45 extensions contain a universal backdoor which can open arbitrary URLs upon browser startup. Additionally, some extensions exfiltrate Telegram sessions, inject ads into YouTube and TikTok, or proxy translation requests through attacker-controlled servers.

The extensions cover multiple product categories, such as Telegram sidebar clients, slot machine games, and YouTube enhancers, all employing the same backend to execute their malicious tasks discreetly.

Examples of Targeted Extensions

One example is the Telegram Multi-account extension, which compromises active Telegram Web sessions by manipulating local storage with attacker-supplied data. Another extension, Web Client for Telegram – Teleside, is capable of stealing sessions and includes a backdoor for direct payload activation.

Furthermore, the 54 extensions targeting Google accounts utilize identical code to acquire OAuth2 tokens and send user information, such as email and profile picture, to a remote server. The tokens remain local, but the extracted identity records are sent to the operator’s server.

Despite reporting these malicious extensions, they have not yet been removed from the Chrome Web Store, raising concerns about user safety and browser security.

Future vigilance from both users and cybersecurity firms like Socket is crucial in mitigating such threats and safeguarding user data against potential exploits.

Security Week News Tags:browser security, Chrome extensions, Chrome Web Store, cyber threats, Cybersecurity, data breach, Malware, OAuth2, Socket report, user data

Post navigation

Previous Post: n8n Webhooks Exploited for Malware Delivery via Phishing
Next Post: Critical Adobe Acrobat Flaws Allow Code Execution

Related Posts

New StackWarp Attack Threatens Confidential VMs on AMD Processors New StackWarp Attack Threatens Confidential VMs on AMD Processors Security Week News
Maze Banks M to Tackle Cloud Security with AI Agents Maze Banks $25M to Tackle Cloud Security with AI Agents Security Week News
Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Security Week News
FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands FTC Calls on Tech Firms to Resist Foreign Anti-Encryption Demands Security Week News
Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Security Week News
China’s Salt Typhoon Hackers Target Canadian Telecom Firms China’s Salt Typhoon Hackers Target Canadian Telecom Firms Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • WordPress Plugins Compromised by Hidden Malware Backdoor
  • Hackers Exploit Google Cloud to Deliver Remcos RAT
  • Trump Advocates for Extending Surveillance Program Amid Privacy Concerns
  • MuddyWater-Style Cyber Attack Targets Middle Eastern Sectors
  • Ivanti Neurons for ITSM Vulnerabilities Resolved

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • WordPress Plugins Compromised by Hidden Malware Backdoor
  • Hackers Exploit Google Cloud to Deliver Remcos RAT
  • Trump Advocates for Extending Surveillance Program Amid Privacy Concerns
  • MuddyWater-Style Cyber Attack Targets Middle Eastern Sectors
  • Ivanti Neurons for ITSM Vulnerabilities Resolved

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark