Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious Chrome Extensions as VPN Intercept User Traffic to Steal Credentials

Posted on December 23, 2025December 23, 2025 By CWS

Two pretend Chrome extensions named “Phantom Shuttle” are deceiving hundreds of customers by posing as official VPN companies whereas secretly intercepting their internet visitors and stealing delicate login info.

These malicious extensions, energetic since 2017, have been distributed to over 2,180 customers by way of the Chrome Internet Retailer, the place they proceed to function undetected.

The menace actor behind the scheme makes use of the e-mail theknewone.com@gmail[.]com to publish each extension variants, which operate identically regardless of having completely different appearances.

Victims are unaware they’re operating malicious software program that screens all their on-line exercise and repeatedly sends their credentials to attacker-controlled servers.

The extensions market themselves as “multi-location community pace testing plugins” designed for builders and Chinese language commerce employees.

Customers buy subscriptions starting from 9.9 to 95.9 yuan (roughly 1.40 to 13.50 USD) by way of official fee strategies, together with Alipay and WeChat Pay.

They obtain purposeful proxy companies that seem to work as marketed, performing actual latency assessments and displaying connection standing.

This industrial facade creates a false sense of safety whereas hiding devastating, malicious exercise occurring within the background.

Socket.dev analysts recognized that the extensions execute full visitors interception by way of a classy credential injection mechanism.

The extensions robotically intercept each HTTP authentication request throughout all web sites and inject hardcoded proxy credentials (username: topfany, password: 963852wei) with out person data.

This permits attackers to redirect all searching visitors by way of their very own proxy servers, successfully making a man-in-the-middle assault.

The Authentication Hijacking Mechanism

The malicious code is hidden inside modified JavaScript libraries bundled with the extension, particularly jquery-1.12.2.min.js and scripts.js.

Researchers discovered that the extensions make use of a customized character-index encoding scheme to obfuscate the hardcoded proxy credentials, thereby making them tougher to detect throughout safety evaluation.

The code registers a listener on chrome.webRequest.onAuthRequired, which intercepts authentication challenges earlier than customers see any prompts.

When triggered, the listener robotically responds with the hardcoded credentials utilizing asyncBlocking mode, guaranteeing the response occurs synchronously with out giving customers any alternative to intervene.

The extension maintains a 60-second heartbeat to the C2 server at phantomshuttle.area, repeatedly exfiltrating person information.

Throughout each heartbeat transmission and VIP standing examine, the extension sends person electronic mail addresses and passwords in plaintext to the attacker infrastructure, occurring each 5 minutes for energetic customers.

The extension stays operational as of December 23, 2025, and Socket.dev has submitted takedown requests to Google’s Chrome Internet Retailer safety workforce.

Customers who put in these extensions ought to instantly uninstall them and alter all passwords used of their browsers.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Chrome, Credentials, Extensions, Intercept, Malicious, Steal, Traffic, User, VPN

Post navigation

Previous Post: U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme
Next Post: 574 Arrested, $3 Million Seized in Crackdown on African Cybercrime Rings

Related Posts

X/Twitter The Most Aggressive Social Media App Collecting Users Location Information Cyber Security News
New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers Cyber Security News
Hackers Drop Info-Stealing Malware On TikTok Users Device Using AI-Generated Videos Cyber Security News
Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks Cyber Security News
SonicWall SMA100 Series N-day Vulnerabilities Technical Details Revealed Cyber Security News
CISA Adds ASUS Embedded Malicious Code Vulnerability to KEV List Following Active Exploitation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical n8n Automation Platform Vulnerability Enables RCE Attacks
  • Nissan Confirms Impact From Red Hat Data Breach
  • Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware
  • Feds Seize Password Database Used in Massive Bank Account Takeover Scheme
  • INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical n8n Automation Platform Vulnerability Enables RCE Attacks
  • Nissan Confirms Impact From Red Hat Data Breach
  • Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware
  • Feds Seize Password Database Used in Massive Bank Account Takeover Scheme
  • INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark