Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extensions as VPN Intercept User Traffic to Steal Credentials

Malicious Chrome Extensions as VPN Intercept User Traffic to Steal Credentials

Posted on December 23, 2025December 23, 2025 By CWS

Two pretend Chrome extensions named “Phantom Shuttle” are deceiving hundreds of customers by posing as official VPN companies whereas secretly intercepting their internet visitors and stealing delicate login info.

These malicious extensions, energetic since 2017, have been distributed to over 2,180 customers by way of the Chrome Internet Retailer, the place they proceed to function undetected.

The menace actor behind the scheme makes use of the e-mail theknewone.com@gmail[.]com to publish each extension variants, which operate identically regardless of having completely different appearances.

Victims are unaware they’re operating malicious software program that screens all their on-line exercise and repeatedly sends their credentials to attacker-controlled servers.

The extensions market themselves as “multi-location community pace testing plugins” designed for builders and Chinese language commerce employees.

Customers buy subscriptions starting from 9.9 to 95.9 yuan (roughly 1.40 to 13.50 USD) by way of official fee strategies, together with Alipay and WeChat Pay.

They obtain purposeful proxy companies that seem to work as marketed, performing actual latency assessments and displaying connection standing.

This industrial facade creates a false sense of safety whereas hiding devastating, malicious exercise occurring within the background.

Socket.dev analysts recognized that the extensions execute full visitors interception by way of a classy credential injection mechanism.

The extensions robotically intercept each HTTP authentication request throughout all web sites and inject hardcoded proxy credentials (username: topfany, password: 963852wei) with out person data.

This permits attackers to redirect all searching visitors by way of their very own proxy servers, successfully making a man-in-the-middle assault.

The Authentication Hijacking Mechanism

The malicious code is hidden inside modified JavaScript libraries bundled with the extension, particularly jquery-1.12.2.min.js and scripts.js.

Researchers discovered that the extensions make use of a customized character-index encoding scheme to obfuscate the hardcoded proxy credentials, thereby making them tougher to detect throughout safety evaluation.

The code registers a listener on chrome.webRequest.onAuthRequired, which intercepts authentication challenges earlier than customers see any prompts.

When triggered, the listener robotically responds with the hardcoded credentials utilizing asyncBlocking mode, guaranteeing the response occurs synchronously with out giving customers any alternative to intervene.

The extension maintains a 60-second heartbeat to the C2 server at phantomshuttle.area, repeatedly exfiltrating person information.

Throughout each heartbeat transmission and VIP standing examine, the extension sends person electronic mail addresses and passwords in plaintext to the attacker infrastructure, occurring each 5 minutes for energetic customers.

The extension stays operational as of December 23, 2025, and Socket.dev has submitted takedown requests to Google’s Chrome Internet Retailer safety workforce.

Customers who put in these extensions ought to instantly uninstall them and alter all passwords used of their browsers.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Chrome, Credentials, Extensions, Intercept, Malicious, Steal, Traffic, User, VPN

Post navigation

Previous Post: U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme
Next Post: 574 Arrested, $3 Million Seized in Crackdown on African Cybercrime Rings

Related Posts

Fake Fortinet Sites Steal VPN Credentials in Sophisticated Phishing Attack Fake Fortinet Sites Steal VPN Credentials in Sophisticated Phishing Attack Cyber Security News
Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Cyber Security News
Users Report Teams and Access Issues Users Report Teams and Access Issues Cyber Security News
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant \Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant Cyber Security News
48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database 48M Gmail, 6.5M Instagram Exposed Online From Unprotected Database Cyber Security News
NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News