Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

Posted on May 20, 2025May 20, 2025 By CWS

Could 20, 2025Ravie LakshmananCredential Theft / Browser Safety
An unknown menace actor has been attributed to creating a number of malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities however incorporate covert performance to exfiltrate knowledge, obtain instructions, and execute arbitrary code.
“The actor creates web sites that masquerade as authentic companies, productiveness instruments, advert and media creation or evaluation assistants, VPN companies, crypto, banking and extra to direct customers to put in corresponding malicious extensions on Google’s Chrome Internet Retailer (CWS),” the DomainTools Intelligence (DTI) crew mentioned in a report shared with The Hacker Information.
Whereas the browser add-ons seem to supply the marketed options, additionally they allow credential and cookie theft, session hijacking, advert injection, malicious redirects, site visitors manipulation, and phishing through DOM manipulation.

One other issue that works within the extensions’ favor is that they’re configured to grant themselves extreme permissions through the manifest.json file, permitting them to work together with each website visited on the browser, execute arbitrary code retrieved from an attacker-controlled area, carry out malicious redirects, and even inject advertisements.
The extensions have additionally been discovered to depend on the “onreset” occasion handler on a short lived doc object mannequin (DOM) factor to execute code, doubtless in an try and bypass content material safety coverage (CSP).
A number of the recognized lure web sites impersonate authentic services like DeepSeek, Manus, DeBank, FortiVPN, and Website Stats to entice customers into downloading and putting in the extensions. The add-ons then proceed to reap browser cookies, fetch arbitrary scripts from a distant server, and arrange a WebSocket connection to behave as a community proxy for site visitors routing.

There may be presently no visibility into how victims are redirected to the bogus websites, however DomainTools informed the publication that it might contain ordinary strategies like phishing and social media.
“As a result of they seem in each Chrome Internet Retailer and have adjoining web sites, they will return from as ends in regular internet searches and for searches inside the Chrome retailer,” the corporate mentioned. “Lots of the lure web sites used Fb monitoring IDs, which strongly suggests they’re leveraging Fb / Meta apps not directly to draw website guests. Probably by way of Fb pages, teams, and even advertisements.”
As of writing, it is not identified who’s behind the marketing campaign, though the menace actors have arrange over 100 faux web sites and malicious Chrome extensions. Google, for its half, has taken down the extensions.

To mitigate dangers, customers are suggested to stay with verified builders earlier than downloading extensions, evaluation requested permissions, scrutinize opinions, and chorus from utilizing lookalike extensions.
That mentioned, it is also value retaining in thoughts that scores may very well be manipulated and artificially inflated by filtering unfavourable consumer suggestions.
DomainTools, in an evaluation revealed late final month, discovered proof of extensions impersonating DeepSeek that redirected customers offering low scores (1-3 stars) to a personal suggestions kind on the ai-chat-bot[.]professional area, whereas sending these offering excessive scores (4-5 stars) to the official Chrome Internet Retailer evaluation web page.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Ads, Chrome, Credentials, Extensions, Fake, Hijacking, Injecting, Sessions, Stealing

Post navigation

Previous Post: VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
Next Post: Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery

Related Posts

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors The Hacker News
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. The Hacker News
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access The Hacker News
Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails The Hacker News
Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet The Hacker News
Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
  • CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation
  • NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands
  • CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation
  • NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News