Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extensions Compromise VKontakte Users

Malicious Chrome Extensions Compromise VKontakte Users

Posted on February 13, 2026 By CWS

Over 500,000 users of VKontakte, Russia’s largest social networking platform, have been targeted by a sophisticated malware campaign via Chrome extensions. These seemingly innocuous extensions have been covertly hijacking user accounts, posing as harmless customization tools for the platform.

Malicious Extensions and Account Hijacking

The extensions, masquerading as VKontakte customization tools, secretly subscribe users to groups managed by attackers, modify account settings every 30 days, and exploit security tokens to maintain ongoing control. This operation, initially mistaken for simple theme customization, is a multi-stage account takeover scheme.

The campaign involves five Chrome extensions connected through a malicious infrastructure, with the most significant, “VK Styles,” reaching 400,000 installations before being removed. These extensions utilize a VKontakte profile as command-and-control infrastructure, evading traditional security scans by hiding payload URLs within HTML metadata tags.

Advanced Malware Delivery Techniques

Researchers from Koi uncovered this threat while analyzing extensions injecting Yandex advertising scripts. The malware uses dynamic metric identifiers to avoid pattern matching by security tools. Obfuscated JavaScript functions in the extensions execute arbitrary code fetched from a GitHub repository controlled by the threat actor known as “2vk.”

The malware’s infection strategy showcases advanced evasion tactics. Upon installation, the extensions inject code into every VK page visited, retrieving encoded instructions from the attacker’s VK profile metadata. This directs the extensions to download additional payloads from GitHub, allowing the threat actor to update malicious functionalities without altering the extension code itself.

Security Implications and Recommendations

The malware manipulates VKontakte’s security mechanisms, such as CSRF protection cookies, to bypass restrictions on unauthorized account actions. It automatically subscribes victims to the attacker’s VK group with a 75% likelihood during each session, establishing a self-propagating distribution network. Every 30 days, it resets account settings to override user preferences, ensuring prolonged control.

This operation, active from June 2025 to January 2026, saw continuous development and feature enhancements over seven months. Security professionals are advised to audit browser extensions, monitor for unusual activity in VK APIs, and enforce extension allowlisting policies.

Users noticing unexpected group subscriptions or changes in settings should promptly remove suspicious VK-related extensions and reevaluate their Chrome extension permissions.

For more updates, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source in Google.

Cyber Security News Tags:account hijacking, browser security, Chrome extensions, Chrome Web Store, Cybersecurity, GitHub, JavaScript, Malware, security breach, security tokens, social network, VK Styles, VKontakte

Post navigation

Previous Post: CISA Alerts on Active Exploitation of Major Software Vulnerabilities
Next Post: Google Tackles AI Threats, Disney Faces Privacy Fine

Related Posts

New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic Cyber Security News
Princeton University Data Breach – Database with Donor Info Compromised Princeton University Data Breach – Database with Donor Info Compromised Cyber Security News
FortiWeb Authentication Bypass Vulnerability Exploited FortiWeb Authentication Bypass Vulnerability Exploited Cyber Security News
PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks Cyber Security News
Hackers Compromise Intelligence Website Used by CIA and Other Agencies Hackers Compromise Intelligence Website Used by CIA and Other Agencies Cyber Security News
Chrome Vulnerabilities Let Attackers Execute Malicious Code Remotely Chrome Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • StealC Malware Targets Windows via Fake CAPTCHA
  • Google Tackles AI Threats, Disney Faces Privacy Fine
  • Malicious Chrome Extensions Compromise VKontakte Users
  • CISA Alerts on Active Exploitation of Major Software Vulnerabilities
  • Zimbra Enhances Security with Critical Update

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • StealC Malware Targets Windows via Fake CAPTCHA
  • Google Tackles AI Threats, Disney Faces Privacy Fine
  • Malicious Chrome Extensions Compromise VKontakte Users
  • CISA Alerts on Active Exploitation of Major Software Vulnerabilities
  • Zimbra Enhances Security with Critical Update

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News