Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chrome, Edge Extensions Caught Stealing ChatGPT Sessions

Chrome, Edge Extensions Caught Stealing ChatGPT Sessions

Posted on January 27, 2026January 27, 2026 By CWS

A menace actor has created 16 browser extensions to steal customers’ ChatGPT periods and printed them to the official Chrome and Edge shops, LayerX stories.

Banking on the elevated adoption of AI-powered browser extensions that fulfill customers’ productiveness wants, the menace actor printed 15 extensions to the Chrome Net Retailer and one to the Microsoft Edge Add-ons market.

Marketed as ChatGPT enhancement and productiveness instruments, the extensions have a mixed obtain rely of over 900, they usually had been nonetheless out there by means of the official marketplaces as of January 26, LayerX says.

The instruments had been designed to intercept customers’ ChatGPT session authentication tokens and ship them to a distant server, however they don’t exploit ChatGPT vulnerabilities to take action.

As a substitute, they inject a content material script into chatgpt.com and execute it within the MAIN JavaScript world.

The script screens outbound requests initialized by the net utility, to establish and extract authorization headers and ship them to a second content material script, which exfiltrates them to the distant server.Commercial. Scroll to proceed studying.

“This method permits the extension operator to authenticate to ChatGPT companies utilizing the sufferer’s lively session and procure all customers’ historical past chats and connectors,” LayerX notes.

The cybersecurity firm explains that the content material scripts within the MAIN JavaScript allow the attacker to work together straight with the web page’s native runtime, as an alternative of counting on the browser’s content-script atmosphere.

The analyzed extensions had been additionally seen exfiltrating extension metadata, utilization telemetry and occasion information, and entry tokens issued by the backend and utilized by the extension service.

“This information permits the attacker to additional broaden entry tokens and allows persistent consumer identification, behavioral profiling, and long-lived entry to third-party companies,” LayerX says.

Based mostly on using a shared codebase, writer traits, and comparable icons, branding, and descriptions, the cybersecurity agency believes a single menace actor is behind all 16 extensions.

“By combining MAIN-world execution with authentication token interception, the operators obtained persistent entry to consumer accounts whereas remaining inside the boundaries of normal net habits. Such strategies are notably troublesome to detect utilizing conventional endpoint or community safety instruments,” LayerX notes.

Associated: ‘Stanley’ Malware Toolkit Permits Phishing through Web site Spoofing

Associated: Anthropic MCP Server Flaws Result in Code Execution, Knowledge Publicity

Associated: Chainlit Vulnerabilities Could Leak Delicate Data

Associated: Weaponized Invite Enabled Calendar Knowledge Theft through Google Gemini

Security Week News Tags:Caught, ChatGPT, Chrome, Edge, Extensions, Sessions, Stealing

Post navigation

Previous Post: Prioritization, Validation, and Outcomes That Matter
Next Post: Cyber Insights 2026: Quantum Computing and the Potential Synergy With Advanced AI

Related Posts

In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed Security Week News
Terra Security Raises  Million for AI Penetration Testing Platform Terra Security Raises $30 Million for AI Penetration Testing Platform Security Week News
Trustifi Raises  Million for AI-Powered Email Security Trustifi Raises $25 Million for AI-Powered Email Security Security Week News
Filigran Raises  Million in Series C Funding Filigran Raises $58 Million in Series C Funding Security Week News
Third DraftKings Hacker Pleads Guilty Third DraftKings Hacker Pleads Guilty Security Week News
Jamf to Go Private Following .2 Billion Acquisition by Francisco Partners Jamf to Go Private Following $2.2 Billion Acquisition by Francisco Partners Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News