Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

Posted on December 31, 2025December 31, 2025 By CWS

The risk actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a 3rd assault marketing campaign codenamed DarkSpectre that has impacted 2.2 million customers of Google Chrome, Microsoft Edge, and Mozilla Firefox.
The exercise is assessed to be the work of a Chinese language risk actor that Koi Safety is monitoring below the moniker DarkSpectre. In all, the campaigns have collectively affected over 8.8 million customers spanning a interval of greater than seven years.
ShadyPanda was first unmasked by the cybersecurity firm earlier this month as concentrating on all three browser customers to facilitate information theft, search question hijacking, and affiliate fraud. It has been discovered to have an effect on 5.6 million customers, together with 1.3 newly recognized victims stemming from over 100 extensions flagged as linked to the identical cluster.
This additionally contains an Edge add-on named “New Tab – Custom-made Dashboard” that contains a logic bomb that waits for 3 days previous to triggering its malicious habits. The time-delayed activation is an try to provide the impression that it is reputable throughout the overview interval and get it permitted.
9 of those extensions are at the moment lively, with an extra 85 “dormant sleepers” which might be benign and meant to draw a consumer base earlier than they’re weaponized through malicious updates. Koi stated the updates had been launched after greater than 5 years in some instances.
The second marketing campaign, GhostPoster, is usually targeted on Firefox customers, concentrating on them with seemingly innocent utilities and VPN instruments to serve malicious JavaScript code designed to hijack affiliate hyperlinks, inject monitoring code, and commit click on and advert fraud. Additional investigation into the exercise has unearthed extra browser add-ons, together with a Google Translate (developer “charliesmithbons”) extension for Opera with almost a million installs.

The third marketing campaign mounted by DarkSpectre is The Zoom Stealer, which includes a set of 18 extensions throughout Chrome, Edge, and Firefox which might be geared in the direction of company assembly intelligence by accumulating on-line meeting-related information like assembly URLs with embedded passwords, assembly IDs, subjects, descriptions, scheduled occasions, and registration standing.

The checklist of recognized extensions and their corresponding IDs is beneath –
Google Chrome –

Chrome Audio Seize (kfokdmfpdnokpmpbjhjbcabgligoelgp)
ZED: Zoom Straightforward Downloader (pdadlkbckhinonakkfkdaadceojbekep)
X (Twitter) Video Downloader (akmdionenlnfcipmdhbhcnkighafmdha)
Google Meet Auto Admit (pabkjoplheapcclldpknfpcepheldbga)
Zoom.us All the time Present “Be part of From Net” (aedgpiecagcpmehhelbibfbgpfiafdkm)
Timer for Google Meet (dpdgjbnanmmlikideilnpfjjdbmneanf)
CVR: Chrome Video Recorder (kabbfhmcaaodobkfbnnehopcghicgffo)
GoToWebinar & GoToMeeting Obtain Recordings (cphibdhgbdoekmkkcbbaoogedpfibeme)
Meet auto admit (ceofheakaalaecnecdkdanhejojkpeai)
Google Meet Tweak (Emojis, Textual content, Cam Results) (dakebdbeofhmlnmjlmhjdmmjmfohiicn)
Mute All on Meet (adjoknoacleghaejlggocbakidkoifle)
Google Meet Push-To-Discuss (pgpidfocdapogajplhjofamgeboonmmj)
Picture Downloader for Fb, Instagram, + (ifklcpoenaammhnoddgedlapnodfcjpn)
Zoomcoder Extension (ebhomdageggjbmomenipfbhcjamfkmbl)
Auto-join for Google Meet (ajfokipknlmjhcioemgnofkpmdnbaldi)

Microsoft Edge –

Edge Audio Seize (mhjdjckeljinofckdibjiojbdpapoecj)

Mozilla Firefox –

Twiter X Video Downloader ({7536027f-96fb-4762-9e02-fdfaedd3bfb5}, printed by “invaliddejavu”)
x-video-downloader ([email protected], printed by “invaliddejavu”)

As is obvious by the names of the extensions, a majority of them are engineered to imitate instruments for enterprise-oriented videoconferencing functions like Google Meet, Zoom, and GoTo Webinar to exfiltrate assembly hyperlinks, credentials, and participant lists over a WebSocket connection in real-time.
It is also able to harvesting particulars about webinar audio system and hosts, comparable to names, titles, bios, profile pictures, and firm affiliations, together with logos, promotional graphics, and session metadata, each time a consumer visits a webinar registration web page through the browser with one of many extensions put in.

These add-ons have been discovered to request entry to greater than 28 video conferencing platforms, together with Cisco WebEx, Google Meet, GoTo Webinar, Microsoft Groups, and Zoom, amongst others, no matter whether or not they required entry to them within the first place.
“This is not shopper fraud – that is company espionage infrastructure,” researchers Tuval Admoni and Gal Hachamov stated. “The Zoom Stealer represents one thing extra focused: systematic assortment of company assembly intelligence. Customers bought what was marketed. The extensions earned belief and constructive critiques. In the meantime, surveillance ran silently within the background.”
The cybersecurity firm stated the gathered data may very well be used to gasoline company espionage by promoting the information to different dangerous actors, and allow social engineering and large-scale impersonation operations.
The Chinese language hyperlinks to the operation are based mostly on a number of clues: constant use of command-and-control (C2) servers hosted on Alibaba Cloud, Web Content material Supplier (ICP) registrations linked to Chinese language provinces like Hubei, code artifacts containing Chinese language-language strings and feedback, and fraud schemes particularly aimed toward Chinese language e-commerce platforms comparable to JD.com and Taobao.
“DarkSpectre possible has extra infrastructure in place proper now – extensions that look fully reputable as a result of they’re reputable, for now,” Koi stated. “They’re nonetheless within the trust-building part, accumulating customers, incomes badges, ready.”

The Hacker News Tags:Browser, Campaigns, DarkSpectre, Exposed, Extension, Impacting, Million, Users, Worldwide

Post navigation

Previous Post: New Cybercrime Tool ErrTraffic Let Attackers Automate ClickFix Attacks
Next Post: Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack

Related Posts

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions The Hacker News
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution The Hacker News
Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra The Hacker News
FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams The Hacker News
Why IT Leaders Must Rethink Backup in the Age of Ransomware The Hacker News
7 Key Workflows for Maximum Impact The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data
  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data
  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark