Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges

Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges

Posted on July 8, 2025July 8, 2025 By CWS

A complicated malware marketing campaign has contaminated over 1.7 million Chrome customers by eleven seemingly professional browser extensions, all of which carried Google’s verified badge and featured placement on the Chrome Net Retailer.

The “Malicious11” marketing campaign, found by cybersecurity researchers at Koi Safety, represents one of many largest browser hijacking operations ever documented, exploiting the very belief indicators customers depend on to determine protected extensions.

The Excellent Trojan Horse Operation

The malicious extensions masqueraded as well-liked productiveness and leisure instruments throughout various classes, together with emoji keyboards, climate forecasts, video velocity controllers, VPN proxies for Discord and TikTok, darkish themes, quantity boosters, and YouTube unblockers.

What made this marketing campaign notably devious was that every extension delivered precisely what it promised whereas concurrently implementing subtle surveillance and hijacking capabilities.

The investigation started when researchers analyzed “Shade Picker, Eyedropper — Geco colorpick,” an extension with over 100,000 installs and 800+ critiques.

Regardless of showing utterly professional and sustaining verified standing, the extension was secretly hijacking customers’ browsers, monitoring each web site go to, and sustaining a persistent command and management backdoor.

Maybe most regarding is how the malware was deployed. These weren’t malicious extensions from day one – they operated legitimately for years earlier than turning into malicious by model updates.

The codebase of every extension remained clear, typically for years, earlier than the malware was applied by automated updates that silently put in for over 1.7 million customers.

“Because of how Google handles browser extension updates, these variations are auto-installed silently,” the researchers famous. “No phishing. No social engineering. Simply trusted extensions with a quiet model bump.”

Refined Browser Hijacking

The malware implements a classy browser hijacking mechanism that prompts each time customers navigate to a brand new web page.

Hidden inside every extension’s background service employee is code that displays all tab exercise, capturing URLs and sending them to distant servers together with distinctive monitoring identifiers.

This creates a large persistent man-in-the-middle functionality that may be exploited at any second.

For instance, customers clicking Zoom assembly invites could possibly be redirected to faux pages claiming they should obtain “vital updates,” or banking classes could possibly be intercepted and redirected to pixel-perfect replicas hosted on attackers’ servers.

The Malicious11 marketing campaign exposes systemic failures in market safety. Google’s verification course of did not detect subtle malware throughout eleven totally different extensions, as a substitute selling a number of by verification badges and featured placement.

The attackers efficiently exploited each belief sign customers depend on – verification badges, set up counts, featured placement, years of professional operation, and constructive critiques.

Customers ought to instantly take away any affected extensions, clear browser knowledge to take away saved monitoring identifiers, run full system malware scans, and monitor accounts for suspicious exercise.

The incident highlights the pressing want for improved market safety mechanisms as risk actors evolve past particular person assaults to create a complete infrastructure that may stay dormant for years earlier than activation.

This marketing campaign represents a watershed second in browser extension safety, demonstrating how the present market safety mannequin is essentially damaged.

Unique Webinar Alert: Harnessing Intel® Processor Improvements for Superior API Safety – Register for Free

Cyber Security News Tags:Affects, Badges, Chrome, Extension, Googles, Million, Users, Verified, Weaponized

Post navigation

Previous Post: Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites
Next Post: Qantas Hit with Extortion Demand After Data Breach

Related Posts

Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes Cyber Security News
Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data Cyber Security News
Hackers Exploit nslookup.exe for DNS Payload Delivery Hackers Exploit nslookup.exe for DNS Payload Delivery Cyber Security News
Achieving Continuous Compliance in Dynamic Threat Environments Achieving Continuous Compliance in Dynamic Threat Environments Cyber Security News
Cybersecurity Newsletter Weekly Recap – UK Hacker Bust to BMW Data Leak Cybersecurity Newsletter Weekly Recap – UK Hacker Bust to BMW Data Leak Cyber Security News
Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark