Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure

0
Medium
Published: Tue Apr 14 2026 (04/14/2026, 15:38:11 UTC)
Source: AlienVault OTX General

Description

A coordinated campaign involving 108 malicious Chrome extensions has been identified, collectively installed about 20,000 times. These extensions operate through shared command-and-control infrastructure at cloudapi. stream and perform various malicious activities including stealing Google account identities via OAuth2, exfiltrating Telegram Web sessions, and enabling a universal backdoor for arbitrary URL execution on browser startup. The extensions impersonate legitimate tools such as Telegram sidebar clients, slot games, and social media enhancers, and are published under five different publisher identities. All stolen data is routed to servers controlled by the same operator, indicating a Malware-as-a-Service model. No specific patches or vendor advisories are provided for these extensions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/14/2026, 16:01:50 UTC

Technical Analysis

This threat campaign consists of 108 malicious Chrome extensions that share a common command-and-control infrastructure hosted at cloudapi.stream. The extensions are categorized into three main groups: 54 that steal Google account credentials via OAuth2, one that exfiltrates Telegram Web sessions every 15 seconds, and 45 that contain a backdoor allowing arbitrary URL execution on browser startup. These extensions masquerade as legitimate applications across various categories and are published under five distinct publisher identities. The campaign's infrastructure and operations suggest a coordinated Malware-as-a-Service business model. There is no indication of vendor patches or official remediation guidance.

Potential Impact

The campaign enables attackers to steal Google account identities, hijack Telegram Web sessions, and execute arbitrary URLs on browser startup, potentially leading to unauthorized access, data theft, and persistent browser compromise. The shared C2 infrastructure consolidates stolen credentials and session data, increasing the scale and impact of the threat. Approximately 20,000 users are estimated to be affected by these malicious extensions. No known exploits in the wild are reported, but the impact on user privacy and security is significant.

Mitigation Recommendations

No official patches or vendor advisories are available for these malicious extensions. The primary mitigation is to identify and remove these extensions from affected browsers. Users should review installed Chrome extensions and uninstall any that are suspicious or match the identified publisher identities (Yana Project, GameGen, SideGames, Rodeo Games, InterAlt). Additionally, users should revoke OAuth2 permissions granted to suspicious extensions via their Google account security settings. Monitoring for unusual account activity and changing passwords for affected accounts is recommended. Since this is not a vulnerability in Chrome itself but malicious extensions, remediation relies on user and administrator action to remove the extensions and revoke permissions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://socket.dev/blog/108-chrome-ext-linked-to-data-exfil-session-theft-shared-c2"]
Adversary
null
Pulse Id
69de5f631a2f4bca81392ccd
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip144.126.135.238

Domain

ValueDescriptionCopy
domaincloudapi.stream
domaininteralt.net
domainmessage.data
domainnashprom.info
domainprofile.email
domainprofile.name
domainwebuk.tech
domainapi.cloudapi.stream
domaincdn.cloudapi.stream
domainchat.cloudapi.stream
domainchrome.runtime.id
domaincoin-miner.cloudapi.stream
domaincrm.cloudapi.stream
domaingamewss.cloudapi.stream
domaingoldminer.cloudapi.stream
domainherculessportslegend.cloudapi.stream
domainmetal.cloudapi.stream
domainmines.cloudapi.stream
domainmultiaccount.cloudapi.stream
domaintg.cloudapi.stream
domaintopup.cloudapi.stream
domainwheel.cloudapi.stream
domaincloudapi.stream
domainapi.cloudapi.stream
domainmines.cloudapi.stream
domaintg.cloudapi.stream

Email

ValueDescriptionCopy
emailsupport@top.rodeo

Url

ValueDescriptionCopy
urlhttp://api.cloudapi.stream:8443/Register
urlhttp://api.cloudapi.stream:8443/Translation
urlhttp://cloudapi.stream/install/
urlhttp://cloudapi.stream/uninstall/
urlhttp://mines.cloudapi.stream/auth_google
urlhttp://mines.cloudapi.stream/slot_test/
urlhttp://mines.cloudapi.stream/user_info
urlhttp://tg.cloudapi.stream/count_sessions.php
urlhttp://tg.cloudapi.stream/delete_session.php
urlhttp://tg.cloudapi.stream/get_session.php
urlhttp://tg.cloudapi.stream/get_sessions.php
urlhttp://tg.cloudapi.stream/save_session.php
urlhttp://tg.cloudapi.stream/save_title.php
urlhttp://top.rodeo/notify.php
urlhttp://top.rodeo/server/remote.php
urlhttp://top.rodeo/server/remote3.php

Threat ID: 69de616b82d89c981fbc694d

Added to database: 4/14/2026, 3:46:51 PM

Last enriched: 4/14/2026, 4:01:50 PM

Last updated: 4/14/2026, 9:56:24 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses