Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Chrome Extensions Threaten Business Security

Malicious Chrome Extensions Threaten Business Security

Posted on February 13, 2026 By CWS

Recent findings by cybersecurity experts have unveiled a dangerous Google Chrome extension that targets business data, posing significant risks to companies utilizing Meta Business Suite and Facebook Business Manager. This extension, known as CL Suite by @CLMasters, is deceptively marketed as a tool to aid in data management and two-factor authentication (2FA) generation. Despite its seemingly useful features, the extension is designed to extract sensitive information without user consent, raising alarms in the cybersecurity community.

Unveiling the Threat

The CL Suite extension, which first appeared on the Chrome Web Store in March 2025, has been identified as a tool for unauthorized data collection. Although it claims to enhance user experience by removing verification pop-ups and managing 2FA codes, it secretly exfiltrates time-based one-time password (TOTP) codes and business analytics to a server controlled by the threat actor. The extension’s privacy policy misleadingly suggests that data remains local, but in reality, it transmits sensitive information to external servers.

Security researcher Kirill Boychenko has highlighted the extension’s ability to collect and forward data, including Meta Business ‘People’ CSV exports and analytics, to a backend server at getauth[.]pro. The extension even has the capability to send this data to a Telegram channel operated by the attackers. This stealthy data scraping is a significant concern for businesses relying on Meta’s platforms for operations.

Broader Implications and Similar Threats

This threat is not isolated. A similar campaign, dubbed VK Styles, has been discovered, targeting VKontakte users. This large-scale attack involves Chrome extensions that manipulate VK accounts, demonstrating the versatility and reach of such malicious tools. The attackers use these extensions to force user subscriptions to VK groups, alter account settings, and bypass security measures, all while maintaining persistent control over the targeted accounts.

More concerning is the revelation of another campaign involving AI-themed browser extensions. These extensions, masquerading as AI assistants for various tasks, have been installed by over 260,000 users. They exploit their perceived utility to siphon sensitive data, including browsing history and Gmail content, by embedding remote-controlled interfaces that bypass Chrome’s security protocols.

Security Recommendations and Future Outlook

With the increasing sophistication of browser extensions as tools for cyber threats, it is crucial for users and organizations to exercise caution. Experts advise minimizing extension installations, regularly auditing installed extensions, and ensuring they come from reputable sources. Implementing separate browser profiles for sensitive tasks and employing allowlisting strategies can also mitigate risks.

The growing trend of malicious browser extensions highlights the need for heightened awareness and improved security measures. As attackers continue to exploit these tools for data exfiltration, both users and developers must remain vigilant to protect sensitive information from unauthorized access.

The Hacker News Tags:AI extensions, browser security, browsing history, Chrome extensions, cyber threat, Cybersecurity, data brokers, data exfiltration, data security, email security, Facebook Business Manager, Meta Business Suite, VKontakte

Post navigation

Previous Post: Data Breach at Dutch Carrier Odido Affects Millions
Next Post: Check Point Boosts AI Security with New Acquisitions

Related Posts

Security Flaws in AI Frameworks Expose Sensitive Data Security Flaws in AI Frameworks Expose Sensitive Data The Hacker News
Warlock Ransomware Exploits Unpatched SmarterMail Server Warlock Ransomware Exploits Unpatched SmarterMail Server The Hacker News
Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program The Hacker News
Dell RecoverPoint VMs Vulnerability Exploited Since 2024 Dell RecoverPoint VMs Vulnerability Exploited Since 2024 The Hacker News
Ransomware Defense Using the Wazuh Open Source Platform Ransomware Defense Using the Wazuh Open Source Platform The Hacker News
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI and Policy Code: Navigating New Security Challenges
  • Enhance SOC Efficiency with Three Key Process Improvements
  • Cybercriminals Exploit Homoglyphs to Mimic Trusted Websites
  • CareCloud Investigates Possible Cybersecurity Breach
  • Critical Security Threats and Global Cyber Developments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI and Policy Code: Navigating New Security Challenges
  • Enhance SOC Efficiency with Three Key Process Improvements
  • Cybercriminals Exploit Homoglyphs to Mimic Trusted Websites
  • CareCloud Investigates Possible Cybersecurity Breach
  • Critical Security Threats and Global Cyber Developments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark