Description

Malicious AI-themed Chrome extensions have been discovered targeting more than 260,000 users through a coordinated surveillance and data-harvesting campaign. Marketed as productivity and AI assistant tools for summarization, chat support, and email enhancement, these extensions conceal hidden functionality that enables large-scale browser monitoring. Security researchers found that the extensions were designed to inject remotely controlled iframes into active browser sessions, allowing threat actors to dynamically manipulate content and extract sensitive information without user awareness. The malicious extensions share nearly identical codebases, permission sets, and command-and-control infrastructure, indicating an organized operation rather than isolated incidents. Once installed, the extensions request broad permissions to read and modify data across visited websites. They inject invisible iframes sourced from attacker-controlled domains, enabling remote script execution within legitimate browsing sessions. This mechanism allows operators to scrape webpage content, capture authenticated session data such as email content, and dynamically update malicious behavior without publishing new versions to the Chrome Web Store. Researchers also observed techniques that allow persistent reinfection, where similar variants are republished after removal, maintaining campaign continuity. The scope of exposure is significant due to the high installation counts and the sensitive nature of accessed data, including webmail, business communications, and potentially confidential enterprise information. Organizations and individual users are advised to audit installed browser extensions, remove unfamiliar AI-branded add-ons, and review granted permissions carefully. Implementing browser security controls, restricting extension installations in enterprise environments, and monitoring for unusual outbound connections can reduce risk. Regular security reviews and user awareness remain critical as threat actors increasingly exploit the popularity of AI tools to distribute malicious browser extensions.