Skip to main content

Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs

Medium
Published: Thu May 22 2025 (05/22/2025, 11:17:12 UTC)
Source: AlienVault OTX General

Description

A campaign targeting the Google Chrome Web Store has deployed over 100 malicious browser extensions masquerading as legitimate tools like VPNs, AI assistants, and crypto utilities. These extensions, while offering some promised functionality, secretly connect to threat actor infrastructure to steal user information and execute remote scripts. They can modify network traffic, deliver ads, perform redirections, and act as proxies. The campaign, discovered by DomainTools researchers, involves numerous fake domains promoting these tools. The extensions request permissions that enable cookie theft, DOM-based phishing, and dynamic script injection. Risks include account hijacking, data theft, and browsing activity monitoring. Some extensions remain on the Chrome Web Store despite Google's removal efforts.

AI-Powered Analysis

AILast updated: 06/22/2025, 01:50:10 UTC

Technical Analysis

This threat involves a large-scale campaign targeting the Google Chrome Web Store, where over 100 malicious browser extensions have been identified masquerading as legitimate tools such as VPN services, AI assistants, crypto utilities, and even well-known brands like Fortinet and YouTube. These extensions are designed to deceive users by offering some promised functionality to appear legitimate, while covertly performing malicious activities. Once installed, the extensions request extensive permissions that allow them to intercept and modify network traffic, steal cookies, inject dynamic scripts, and perform DOM-based phishing attacks. This enables the threat actors to harvest sensitive user information, including authentication tokens, browsing activity, and potentially credentials, which can lead to account hijacking and further compromise. The extensions also have capabilities to deliver unwanted advertisements, redirect users to malicious or phishing sites, and act as proxies to obfuscate attacker infrastructure. Despite Google's ongoing efforts to detect and remove these extensions, some remain active on the Chrome Web Store, facilitated by the use of numerous fake domains promoting these tools to lure victims. The campaign leverages multiple attack techniques including remote script execution (T1059.007), user execution (T1204.002), command and control over web protocols (T1071), and credential access via input capture and cookie theft (T1056, T1189). The threat is notable for its scale, persistence, and the exploitation of trusted platforms and brands to increase user trust and installation rates.

Potential Impact

For European organizations, this campaign poses significant risks primarily through the compromise of user credentials and sensitive data leakage. Employees installing these extensions on corporate or personal devices used for work can inadvertently expose internal systems to attackers, enabling lateral movement or data exfiltration. The ability of these extensions to intercept network traffic and inject scripts can undermine the confidentiality and integrity of communications, potentially exposing sensitive corporate information or enabling phishing attacks targeting internal users. The impersonation of trusted brands like Fortinet, which is widely used in enterprise security appliances, can further erode trust and complicate incident response. Additionally, the use of proxy capabilities and redirections can facilitate further malware delivery or command and control communication, increasing the attack surface. The persistence of some malicious extensions on the Chrome Web Store means that European users remain at risk, especially in sectors with high reliance on Chrome and browser-based tools, such as finance, technology, and government. The campaign could also impact privacy compliance obligations under GDPR if personal data is stolen or misused.

Mitigation Recommendations

To mitigate this threat, European organizations should implement a multi-layered approach beyond generic advice: 1) Enforce strict browser extension policies via enterprise management tools such as Google Workspace Admin Console or Microsoft Endpoint Manager to whitelist only approved extensions and block all others. 2) Conduct regular audits of installed extensions on corporate devices to detect and remove unauthorized or suspicious ones. 3) Educate users specifically about the risks of installing extensions from unverified sources, emphasizing the dangers of extensions impersonating well-known brands and the importance of verifying publisher information. 4) Deploy network monitoring solutions capable of detecting unusual outbound connections or traffic patterns indicative of proxying or data exfiltration from browser extensions. 5) Integrate endpoint detection and response (EDR) tools that can identify suspicious script injections or abnormal browser behaviors. 6) Collaborate with security vendors to update threat intelligence feeds with indicators of compromise related to this campaign for proactive detection. 7) Encourage the use of multi-factor authentication (MFA) to reduce the impact of stolen credentials. 8) Regularly review and update browser and extension security settings to limit permissions requested by extensions, especially those that can access cookies or modify web content. 9) Engage with Google’s reporting mechanisms to flag and expedite removal of malicious extensions still present on the Chrome Web Store.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.bleepingcomputer.com/news/security/data-stealing-chrome-extensions-impersonate-fortinet-youtube-vpns/"]
Adversary
Pulse Id
682f07b89e80683352ba4d5a

Indicators of Compromise

Domain

ValueDescriptionCopy
domaincalendly-director.com
domaincalendlydaily.world
domaincalendlydocker.com
domaindebank-extension.world
domaindebank.click
domaindebank.sbs
domaindeepseek-ai.link
domainearthvpn.top
domainflight-radar.life
domainforti-vpn.com
domainfortivnp.com
domaininfograph.top
domainiron-tunnel.com
domainirontunnel.world
domainmadgicx-plus.com
domainmadgicxads.world
domainorchid-vpn.com
domainraccoon-vpn.world
domainsimilar-net.com
domainsoul-vpn.com
domainwhale-alert.life
domainwhale-alerts.org
domainworkfront-plus.com
domainyoutube-vision.com
domainyoutube-vision.world

Threat ID: 682f08eb0acd01a249258e9b

Added to database: 5/22/2025, 11:22:19 AM

Last enriched: 6/22/2025, 1:50:10 AM

Last updated: 7/30/2025, 4:08:58 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats