Description

Cybersecurity researchers have discovered that two Google Chrome extensions—QuickLens – Search Screen with Google Lens and ShotBird – Scrolling Screenshots, Tweet Images & Editor—became malicious after a suspected ownership transfer. Originally published by a legitimate developer, the extensions were later transferred to new owners who pushed weaponized updates to existing users. QuickLens had about 7,000 users, while ShotBird had around 800 users. Although QuickLens has since been removed from the Chrome Web Store, ShotBird remained available at the time of the report, increasing the risk for current users. The malicious update introduced capabilities that allowed attackers to inject arbitrary JavaScript code into web pages, bypass browser security protections, and collect sensitive user data. In the case of QuickLens, the extension periodically contacted an external command-and-control (C2) server to fetch malicious scripts that were stored in the browser’s local storage and executed during page loads. ShotBird used a similar technique but delivered malicious JavaScript callbacks that displayed a fake Chrome update prompt. Victims who followed the instructions were tricked into running a PowerShell command that downloaded a malicious executable named googleupdate.exe, enabling attackers to capture credentials, payment information, and other sensitive data. Security experts believe both extensions were compromised by the same threat actor due to similarities in infrastructure and attack techniques. Users who installed these extensions are advised to remove them immediately. Organizations should monitor browser extensions used across corporate environments, restrict installation of unverified add-ons, and deploy endpoint protection tools capable of detecting malicious scripts and suspicious PowerShell execution.