Description

Security researchers have uncovered a large-scale and persistent browser-based malware operation attributed to a threat group known as DarkSpectre, which has compromised more than 8.8 million users worldwide. The campaign has been active for several years and primarily targets popular browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox. Attackers distribute their malware through browser extensions that appear legitimate and useful, allowing them to gain widespread adoption before revealing any malicious behavior. This delayed activation strategy enables the extensions to remain trusted and installed for long periods without raising suspicion. Technically, the operation relies on a coordinated ecosystem of malicious extensions linked through shared infrastructure and development patterns. These extensions initially function as advertised, but later enable hidden capabilities that allow attackers to monitor browsing activity, collect sensitive data, and communicate with external command-and-control servers. The campaign includes multiple interconnected clusters, each focused on specific objectives, such as data harvesting or corporate surveillance. To evade detection, the extensions use advanced concealment methods, including time-based triggers and embedding executable code within seemingly harmless resources like images, helping them bypass automated marketplace reviews and security scans. The impact of the DarkSpectre campaign extends beyond individual users to organizations and enterprises. In some cases, the malware specifically targets collaboration and meeting platforms, extracting meeting identifiers, access links, and related metadata. This level of access enables intelligence gathering, account abuse, and potential follow-on attacks. Overall, the campaign represents a high-risk threat due to its scale, longevity, and ability to exploit trusted software distribution channels, placing both personal and corporate data at significant risk.