Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake AI Chrome Extensions Compromise Over 260,000 Users

Fake AI Chrome Extensions Compromise Over 260,000 Users

Posted on February 13, 2026 By CWS

A recent cybersecurity threat has emerged, involving malicious Chrome extensions masquerading as popular AI tools such as ChatGPT, Claude, Gemini, and Grok. These deceptive extensions, installed by over 260,000 users, employ remote-controlled iframes to conduct surveillance.

Widespread Impact Through Deceptive Extensions

Security experts have identified at least 30 Chrome extensions advertised as AI assistants for activities like summarization, chatting, translation, image creation, and email productivity. Despite differing in appearance and branding, these extensions share a common codebase and infrastructure, confirming a coordinated campaign.

Some of these malicious extensions were even labeled as ‘Featured’ on the Chrome Web Store, enhancing their legitimacy and download rates. This tactic has significantly contributed to the widespread distribution and installation of these harmful tools.

Technical Insights and Strategy

Attackers utilize a method known as ‘extension spraying,’ where a removed extension is swiftly replaced by a clone with a new name and ID. Instead of running AI functionalities natively, these extensions load a full-screen iframe from attacker-controlled domains like tapnetic[.]pro. This setup allows operators to modify functionality remotely without updating the Chrome Web Store version.

Once installed, these extensions can extract readable content from active browser tabs, capture voice input via the Web Speech API, and track installation metrics through hidden telemetry. A specific set of 15 extensions focuses on Gmail, injecting scripts to monitor and collect visible email content.

Protective Measures and Recommendations

All identified extensions communicate with domains under tapnetic[.]pro and onlineapp[.]pro, with themed subdomains linking back to a central backend system. When a high-install extension was removed in February 2025, an identical version reappeared quickly, illustrating the attackers’ persistence and adaptability.

To safeguard against these threats, cybersecurity experts recommend auditing AI-branded Chrome extensions within networks, monitoring for unusual iframe injections, and keeping an eye on outbound traffic to suspicious domains. Prioritizing runtime monitoring over static reviews can also enhance defensive measures.

Organizations should approach AI-themed browser extensions cautiously, implementing strict management policies to prevent potential breaches. Stay informed by following cybersecurity updates on platforms like Google News, LinkedIn, and X.

Cyber Security News Tags:AI, browser security, Chrome extensions, cyber threats, Cybersecurity, data breach, IFrame Injection, malicious extensions, online security, security research

Post navigation

Previous Post: Russian Group Linked to Malware Attacks on Ukraine
Next Post: Global Cyber Threats Target Defense Sector Amid Rising Tensions

Related Posts

Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands Malicious Python Package Mimic as Attacking Discord Developers With Malicious Remote Commands Cyber Security News
Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Cyber Security News
Here’s How to Solve It  Here’s How to Solve It  Cyber Security News
Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Amazon WorkSpaces For Linux Vulnerability Let Attackers extract valid authentication token Cyber Security News
Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication Cyber Security News
Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Global Cyber Threats Target Defense Sector Amid Rising Tensions
  • Fake AI Chrome Extensions Compromise Over 260,000 Users
  • Russian Group Linked to Malware Attacks on Ukraine
  • XWorm RAT Campaign Evades Detection with Excel Exploit
  • UAT-9921 Targets Tech and Finance with VoidLink Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Global Cyber Threats Target Defense Sector Amid Rising Tensions
  • Fake AI Chrome Extensions Compromise Over 260,000 Users
  • Russian Group Linked to Malware Attacks on Ukraine
  • XWorm RAT Campaign Evades Detection with Excel Exploit
  • UAT-9921 Targets Tech and Finance with VoidLink Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News