Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges

Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges

Posted on July 8, 2025July 8, 2025 By CWS

A complicated malware marketing campaign has contaminated over 1.7 million Chrome customers by eleven seemingly professional browser extensions, all of which carried Google’s verified badge and featured placement on the Chrome Net Retailer.

The “Malicious11” marketing campaign, found by cybersecurity researchers at Koi Safety, represents one of many largest browser hijacking operations ever documented, exploiting the very belief indicators customers depend on to determine protected extensions.

The Excellent Trojan Horse Operation

The malicious extensions masqueraded as well-liked productiveness and leisure instruments throughout various classes, together with emoji keyboards, climate forecasts, video velocity controllers, VPN proxies for Discord and TikTok, darkish themes, quantity boosters, and YouTube unblockers.

What made this marketing campaign notably devious was that every extension delivered precisely what it promised whereas concurrently implementing subtle surveillance and hijacking capabilities.

The investigation started when researchers analyzed “Shade Picker, Eyedropper — Geco colorpick,” an extension with over 100,000 installs and 800+ critiques.

Regardless of showing utterly professional and sustaining verified standing, the extension was secretly hijacking customers’ browsers, monitoring each web site go to, and sustaining a persistent command and management backdoor.

Maybe most regarding is how the malware was deployed. These weren’t malicious extensions from day one – they operated legitimately for years earlier than turning into malicious by model updates.

The codebase of every extension remained clear, typically for years, earlier than the malware was applied by automated updates that silently put in for over 1.7 million customers.

“Because of how Google handles browser extension updates, these variations are auto-installed silently,” the researchers famous. “No phishing. No social engineering. Simply trusted extensions with a quiet model bump.”

Refined Browser Hijacking

The malware implements a classy browser hijacking mechanism that prompts each time customers navigate to a brand new web page.

Hidden inside every extension’s background service employee is code that displays all tab exercise, capturing URLs and sending them to distant servers together with distinctive monitoring identifiers.

This creates a large persistent man-in-the-middle functionality that may be exploited at any second.

For instance, customers clicking Zoom assembly invites could possibly be redirected to faux pages claiming they should obtain “vital updates,” or banking classes could possibly be intercepted and redirected to pixel-perfect replicas hosted on attackers’ servers.

The Malicious11 marketing campaign exposes systemic failures in market safety. Google’s verification course of did not detect subtle malware throughout eleven totally different extensions, as a substitute selling a number of by verification badges and featured placement.

The attackers efficiently exploited each belief sign customers depend on – verification badges, set up counts, featured placement, years of professional operation, and constructive critiques.

Customers ought to instantly take away any affected extensions, clear browser knowledge to take away saved monitoring identifiers, run full system malware scans, and monitor accounts for suspicious exercise.

The incident highlights the pressing want for improved market safety mechanisms as risk actors evolve past particular person assaults to create a complete infrastructure that may stay dormant for years earlier than activation.

This marketing campaign represents a watershed second in browser extension safety, demonstrating how the present market safety mannequin is essentially damaged.

Unique Webinar Alert: Harnessing Intel® Processor Improvements for Superior API Safety – Register for Free

Cyber Security News Tags:Affects, Badges, Chrome, Extension, Googles, Million, Users, Verified, Weaponized

Post navigation

Previous Post: Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites
Next Post: Qantas Hit with Extortion Demand After Data Breach

Related Posts

Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It Cyber Security News
Microsoft Releases Urgent Windows 11 Update for Account Sign-In Bug Microsoft Releases Urgent Windows 11 Update for Account Sign-In Bug Cyber Security News
Hackers Target React Server Components for Cyber Attacks Hackers Target React Server Components for Cyber Attacks Cyber Security News
Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users’ Personal Information Cyber Security News
Threat Actors Weaponizes LNK File to Deploy MoonPeak Malware Attacking Windows Systems Threat Actors Weaponizes LNK File to Deploy MoonPeak Malware Attacking Windows Systems Cyber Security News
Beware of Fake AI Business Tools That Hides Ransomware Beware of Fake AI Business Tools That Hides Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark