Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges

Posted on July 8, 2025July 8, 2025 By CWS

A complicated malware marketing campaign has contaminated over 1.7 million Chrome customers by eleven seemingly professional browser extensions, all of which carried Google’s verified badge and featured placement on the Chrome Net Retailer.

The “Malicious11” marketing campaign, found by cybersecurity researchers at Koi Safety, represents one of many largest browser hijacking operations ever documented, exploiting the very belief indicators customers depend on to determine protected extensions.

The Excellent Trojan Horse Operation

The malicious extensions masqueraded as well-liked productiveness and leisure instruments throughout various classes, together with emoji keyboards, climate forecasts, video velocity controllers, VPN proxies for Discord and TikTok, darkish themes, quantity boosters, and YouTube unblockers.

What made this marketing campaign notably devious was that every extension delivered precisely what it promised whereas concurrently implementing subtle surveillance and hijacking capabilities.

The investigation started when researchers analyzed “Shade Picker, Eyedropper — Geco colorpick,” an extension with over 100,000 installs and 800+ critiques.

Regardless of showing utterly professional and sustaining verified standing, the extension was secretly hijacking customers’ browsers, monitoring each web site go to, and sustaining a persistent command and management backdoor.

Maybe most regarding is how the malware was deployed. These weren’t malicious extensions from day one – they operated legitimately for years earlier than turning into malicious by model updates.

The codebase of every extension remained clear, typically for years, earlier than the malware was applied by automated updates that silently put in for over 1.7 million customers.

“Because of how Google handles browser extension updates, these variations are auto-installed silently,” the researchers famous. “No phishing. No social engineering. Simply trusted extensions with a quiet model bump.”

Refined Browser Hijacking

The malware implements a classy browser hijacking mechanism that prompts each time customers navigate to a brand new web page.

Hidden inside every extension’s background service employee is code that displays all tab exercise, capturing URLs and sending them to distant servers together with distinctive monitoring identifiers.

This creates a large persistent man-in-the-middle functionality that may be exploited at any second.

For instance, customers clicking Zoom assembly invites could possibly be redirected to faux pages claiming they should obtain “vital updates,” or banking classes could possibly be intercepted and redirected to pixel-perfect replicas hosted on attackers’ servers.

The Malicious11 marketing campaign exposes systemic failures in market safety. Google’s verification course of did not detect subtle malware throughout eleven totally different extensions, as a substitute selling a number of by verification badges and featured placement.

The attackers efficiently exploited each belief sign customers depend on – verification badges, set up counts, featured placement, years of professional operation, and constructive critiques.

Customers ought to instantly take away any affected extensions, clear browser knowledge to take away saved monitoring identifiers, run full system malware scans, and monitor accounts for suspicious exercise.

The incident highlights the pressing want for improved market safety mechanisms as risk actors evolve past particular person assaults to create a complete infrastructure that may stay dormant for years earlier than activation.

This marketing campaign represents a watershed second in browser extension safety, demonstrating how the present market safety mannequin is essentially damaged.

Unique Webinar Alert: Harnessing Intel® Processor Improvements for Superior API Safety – Register for Free

Cyber Security News Tags:Affects, Badges, Chrome, Extension, Googles, Million, Users, Verified, Weaponized

Post navigation

Previous Post: Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites
Next Post: Qantas Hit with Extortion Demand After Data Breach

Related Posts

Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database Cyber Security News
Halo Security Honored with 2025 MSP Today Product of the Year Award Cyber Security News
Hackers Allegedly Claim Breach of Scania Financial Services, Sensitive Data Stolen Cyber Security News
Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon Cyber Security News
VOIP-Based Botnet Attacking Routers Configured With Default Password Cyber Security News
NoName057(16)’s Hackers Attacked 3,700 Unique Devices Over Last Thirteen Months Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News