Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extensions Target Google and Telegram Data

Malicious Chrome Extensions Target Google and Telegram Data

Posted on April 14, 2026 By CWS

In a recent cybersecurity alert, experts have uncovered a disturbing scheme involving a total of 108 Google Chrome extensions designed to harvest user data and abuse browser functionalities. These extensions, which have been installed approximately 20,000 times from the Chrome Web Store, communicate with a centralized command-and-control (C2) infrastructure to execute their malicious activities, including the injection of advertisements and arbitrary JavaScript code into visited websites.

Extension Identities and Distribution

The extensions are attributed to five different publishers: Yana Project, GameGen, SideGames, Rodeo Games, and InterAlt. Despite their varied appearances, all extensions share the same backend and are part of a coordinated effort to compromise user data. Kush Pandya, a security researcher, highlighted that these extensions transmit credentials, user identities, and browsing information to servers controlled by a single operator.

Among the 108 extensions, 54 specifically target Google account identities using OAuth2, while 45 possess a universal backdoor that triggers the opening of arbitrary URLs upon browser startup. The rest partake in various malicious acts, such as exfiltrating Telegram Web sessions every 15 seconds and manipulating security headers on YouTube and TikTok to insert gambling ads.

Deceptive Appearances and Functions

To appear legitimate, these extensions pose as utilities and tools such as Telegram sidebar clients, slot machine games, video platform enhancers, and text translators. However, unbeknownst to users, they run harmful code in the background to capture session details, inject scripts, and navigate to URLs chosen by the attackers.

Notable extensions include ‘Telegram Multi-account,’ which exfiltrates Telegram Web user_auth tokens, and ‘Web Client for Telegram – Teleside,’ which modifies Telegram’s security headers to steal sessions. Another, ‘Formula Rush Racing Game,’ captures Google account details during user sign-in attempts.

Security Implications and Recommendations

Security researcher Socket has noted that five of these extensions use Chrome’s declarativeNetRequest API to strip security headers, thus enabling their malicious activities before a webpage fully loads. All identified extensions have a backend hosted at the IP address 144.126.135[.]238, although the developers’ identities remain unknown. Insights from source code analysis point to possible Russian origins, as indicated by language comments found in several extensions.

Users who have downloaded any of these extensions are strongly advised to uninstall them immediately and to log out of all active Telegram Web sessions via the mobile application to safeguard their accounts.

In conclusion, this incident underscores the persistent threat of malicious browser extensions. Users are encouraged to remain vigilant, review extension permissions regularly, and install only trusted and verified browser add-ons. Continuous monitoring and swift response are essential to mitigate the risks posed by such cyber threats.

The Hacker News Tags:ad injection, browser add-ons, browser security, C2 infrastructure, Chrome extensions, Cybersecurity, data theft, Google, internet safety, JavaScript, Malware, OAuth2, online privacy, security threats, Telegram

Post navigation

Previous Post: CISA Highlights Six Exploited Flaws in Major Software
Next Post: RCI Hospitality Faces Data Breach Exposing Sensitive Info

Related Posts

Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition The Hacker News
Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure The Hacker News
PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms The Hacker News
Turning Disruptive Technology into a Strategic Advantage Turning Disruptive Technology into a Strategic Advantage The Hacker News
U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation The Hacker News
How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SAP Mitigates Severe ABAP Security Flaw
  • Mirax Android RAT Exploits Devices as Proxies via Meta Ads
  • FBI and Indonesian Police Dismantle Global Phishing Network
  • Triad Nexus Maneuvers Around Sanctions to Sustain Cybercrime
  • Critical Security Risks Skyrocket: OX Security’s 2026 Analysis

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SAP Mitigates Severe ABAP Security Flaw
  • Mirax Android RAT Exploits Devices as Proxies via Meta Ads
  • FBI and Indonesian Police Dismantle Global Phishing Network
  • Triad Nexus Maneuvers Around Sanctions to Sustain Cybercrime
  • Critical Security Risks Skyrocket: OX Security’s 2026 Analysis

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark