Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extensions as VPN Intercept User Traffic to Steal Credentials

Malicious Chrome Extensions as VPN Intercept User Traffic to Steal Credentials

Posted on December 23, 2025December 23, 2025 By CWS

Two pretend Chrome extensions named “Phantom Shuttle” are deceiving hundreds of customers by posing as official VPN companies whereas secretly intercepting their internet visitors and stealing delicate login info.

These malicious extensions, energetic since 2017, have been distributed to over 2,180 customers by way of the Chrome Internet Retailer, the place they proceed to function undetected.

The menace actor behind the scheme makes use of the e-mail theknewone.com@gmail[.]com to publish each extension variants, which operate identically regardless of having completely different appearances.

Victims are unaware they’re operating malicious software program that screens all their on-line exercise and repeatedly sends their credentials to attacker-controlled servers.

The extensions market themselves as “multi-location community pace testing plugins” designed for builders and Chinese language commerce employees.

Customers buy subscriptions starting from 9.9 to 95.9 yuan (roughly 1.40 to 13.50 USD) by way of official fee strategies, together with Alipay and WeChat Pay.

They obtain purposeful proxy companies that seem to work as marketed, performing actual latency assessments and displaying connection standing.

This industrial facade creates a false sense of safety whereas hiding devastating, malicious exercise occurring within the background.

Socket.dev analysts recognized that the extensions execute full visitors interception by way of a classy credential injection mechanism.

The extensions robotically intercept each HTTP authentication request throughout all web sites and inject hardcoded proxy credentials (username: topfany, password: 963852wei) with out person data.

This permits attackers to redirect all searching visitors by way of their very own proxy servers, successfully making a man-in-the-middle assault.

The Authentication Hijacking Mechanism

The malicious code is hidden inside modified JavaScript libraries bundled with the extension, particularly jquery-1.12.2.min.js and scripts.js.

Researchers discovered that the extensions make use of a customized character-index encoding scheme to obfuscate the hardcoded proxy credentials, thereby making them tougher to detect throughout safety evaluation.

The code registers a listener on chrome.webRequest.onAuthRequired, which intercepts authentication challenges earlier than customers see any prompts.

When triggered, the listener robotically responds with the hardcoded credentials utilizing asyncBlocking mode, guaranteeing the response occurs synchronously with out giving customers any alternative to intervene.

The extension maintains a 60-second heartbeat to the C2 server at phantomshuttle.area, repeatedly exfiltrating person information.

Throughout each heartbeat transmission and VIP standing examine, the extension sends person electronic mail addresses and passwords in plaintext to the attacker infrastructure, occurring each 5 minutes for energetic customers.

The extension stays operational as of December 23, 2025, and Socket.dev has submitted takedown requests to Google’s Chrome Internet Retailer safety workforce.

Customers who put in these extensions ought to instantly uninstall them and alter all passwords used of their browsers.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Chrome, Credentials, Extensions, Intercept, Malicious, Steal, Traffic, User, VPN

Post navigation

Previous Post: U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme
Next Post: 574 Arrested, $3 Million Seized in Crackdown on African Cybercrime Rings

Related Posts

Cybercriminals Target Winter Olympics Fans with Fake Shops Cybercriminals Target Winter Olympics Fans with Fake Shops Cyber Security News
CanisterWorm Malware Threatens Cloud Security Globally CanisterWorm Malware Threatens Cloud Security Globally Cyber Security News
CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks Cyber Security News
20 Best Inventory Management Tools in 2025 20 Best Inventory Management Tools in 2025 Cyber Security News
Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations Cyber Security News
Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark