Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs
A campaign targeting the Google Chrome Web Store has deployed over 100 malicious browser extensions masquerading as legitimate tools like VPNs, AI assistants, and crypto utilities. These extensions, while offering some promised functionality, secretly connect to threat actor infrastructure to steal user information and execute remote scripts. They can modify network traffic, deliver ads, perform redirections, and act as proxies. The campaign, discovered by DomainTools researchers, involves numerous fake domains promoting these tools. The extensions request permissions that enable cookie theft, DOM-based phishing, and dynamic script injection. Risks include account hijacking, data theft, and browsing activity monitoring. Some extensions remain on the Chrome Web Store despite Google's removal efforts.
AI Analysis
Technical Summary
This threat involves a large-scale campaign targeting the Google Chrome Web Store, where over 100 malicious browser extensions have been identified masquerading as legitimate tools such as VPN services, AI assistants, crypto utilities, and even well-known brands like Fortinet and YouTube. These extensions are designed to deceive users by offering some promised functionality to appear legitimate, while covertly performing malicious activities. Once installed, the extensions request extensive permissions that allow them to intercept and modify network traffic, steal cookies, inject dynamic scripts, and perform DOM-based phishing attacks. This enables the threat actors to harvest sensitive user information, including authentication tokens, browsing activity, and potentially credentials, which can lead to account hijacking and further compromise. The extensions also have capabilities to deliver unwanted advertisements, redirect users to malicious or phishing sites, and act as proxies to obfuscate attacker infrastructure. Despite Google's ongoing efforts to detect and remove these extensions, some remain active on the Chrome Web Store, facilitated by the use of numerous fake domains promoting these tools to lure victims. The campaign leverages multiple attack techniques including remote script execution (T1059.007), user execution (T1204.002), command and control over web protocols (T1071), and credential access via input capture and cookie theft (T1056, T1189). The threat is notable for its scale, persistence, and the exploitation of trusted platforms and brands to increase user trust and installation rates.
Potential Impact
For European organizations, this campaign poses significant risks primarily through the compromise of user credentials and sensitive data leakage. Employees installing these extensions on corporate or personal devices used for work can inadvertently expose internal systems to attackers, enabling lateral movement or data exfiltration. The ability of these extensions to intercept network traffic and inject scripts can undermine the confidentiality and integrity of communications, potentially exposing sensitive corporate information or enabling phishing attacks targeting internal users. The impersonation of trusted brands like Fortinet, which is widely used in enterprise security appliances, can further erode trust and complicate incident response. Additionally, the use of proxy capabilities and redirections can facilitate further malware delivery or command and control communication, increasing the attack surface. The persistence of some malicious extensions on the Chrome Web Store means that European users remain at risk, especially in sectors with high reliance on Chrome and browser-based tools, such as finance, technology, and government. The campaign could also impact privacy compliance obligations under GDPR if personal data is stolen or misused.
Mitigation Recommendations
To mitigate this threat, European organizations should implement a multi-layered approach beyond generic advice: 1) Enforce strict browser extension policies via enterprise management tools such as Google Workspace Admin Console or Microsoft Endpoint Manager to whitelist only approved extensions and block all others. 2) Conduct regular audits of installed extensions on corporate devices to detect and remove unauthorized or suspicious ones. 3) Educate users specifically about the risks of installing extensions from unverified sources, emphasizing the dangers of extensions impersonating well-known brands and the importance of verifying publisher information. 4) Deploy network monitoring solutions capable of detecting unusual outbound connections or traffic patterns indicative of proxying or data exfiltration from browser extensions. 5) Integrate endpoint detection and response (EDR) tools that can identify suspicious script injections or abnormal browser behaviors. 6) Collaborate with security vendors to update threat intelligence feeds with indicators of compromise related to this campaign for proactive detection. 7) Encourage the use of multi-factor authentication (MFA) to reduce the impact of stolen credentials. 8) Regularly review and update browser and extension security settings to limit permissions requested by extensions, especially those that can access cookies or modify web content. 9) Engage with Google’s reporting mechanisms to flag and expedite removal of malicious extensions still present on the Chrome Web Store.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Ireland
Indicators of Compromise
- domain: calendly-director.com
- domain: calendlydaily.world
- domain: calendlydocker.com
- domain: debank-extension.world
- domain: debank.click
- domain: debank.sbs
- domain: deepseek-ai.link
- domain: earthvpn.top
- domain: flight-radar.life
- domain: forti-vpn.com
- domain: fortivnp.com
- domain: infograph.top
- domain: iron-tunnel.com
- domain: irontunnel.world
- domain: madgicx-plus.com
- domain: madgicxads.world
- domain: orchid-vpn.com
- domain: raccoon-vpn.world
- domain: similar-net.com
- domain: soul-vpn.com
- domain: whale-alert.life
- domain: whale-alerts.org
- domain: workfront-plus.com
- domain: youtube-vision.com
- domain: youtube-vision.world
Data-stealing Chrome extensions impersonate Fortinet, YouTube, VPNs
Description
A campaign targeting the Google Chrome Web Store has deployed over 100 malicious browser extensions masquerading as legitimate tools like VPNs, AI assistants, and crypto utilities. These extensions, while offering some promised functionality, secretly connect to threat actor infrastructure to steal user information and execute remote scripts. They can modify network traffic, deliver ads, perform redirections, and act as proxies. The campaign, discovered by DomainTools researchers, involves numerous fake domains promoting these tools. The extensions request permissions that enable cookie theft, DOM-based phishing, and dynamic script injection. Risks include account hijacking, data theft, and browsing activity monitoring. Some extensions remain on the Chrome Web Store despite Google's removal efforts.
AI-Powered Analysis
Technical Analysis
This threat involves a large-scale campaign targeting the Google Chrome Web Store, where over 100 malicious browser extensions have been identified masquerading as legitimate tools such as VPN services, AI assistants, crypto utilities, and even well-known brands like Fortinet and YouTube. These extensions are designed to deceive users by offering some promised functionality to appear legitimate, while covertly performing malicious activities. Once installed, the extensions request extensive permissions that allow them to intercept and modify network traffic, steal cookies, inject dynamic scripts, and perform DOM-based phishing attacks. This enables the threat actors to harvest sensitive user information, including authentication tokens, browsing activity, and potentially credentials, which can lead to account hijacking and further compromise. The extensions also have capabilities to deliver unwanted advertisements, redirect users to malicious or phishing sites, and act as proxies to obfuscate attacker infrastructure. Despite Google's ongoing efforts to detect and remove these extensions, some remain active on the Chrome Web Store, facilitated by the use of numerous fake domains promoting these tools to lure victims. The campaign leverages multiple attack techniques including remote script execution (T1059.007), user execution (T1204.002), command and control over web protocols (T1071), and credential access via input capture and cookie theft (T1056, T1189). The threat is notable for its scale, persistence, and the exploitation of trusted platforms and brands to increase user trust and installation rates.
Potential Impact
For European organizations, this campaign poses significant risks primarily through the compromise of user credentials and sensitive data leakage. Employees installing these extensions on corporate or personal devices used for work can inadvertently expose internal systems to attackers, enabling lateral movement or data exfiltration. The ability of these extensions to intercept network traffic and inject scripts can undermine the confidentiality and integrity of communications, potentially exposing sensitive corporate information or enabling phishing attacks targeting internal users. The impersonation of trusted brands like Fortinet, which is widely used in enterprise security appliances, can further erode trust and complicate incident response. Additionally, the use of proxy capabilities and redirections can facilitate further malware delivery or command and control communication, increasing the attack surface. The persistence of some malicious extensions on the Chrome Web Store means that European users remain at risk, especially in sectors with high reliance on Chrome and browser-based tools, such as finance, technology, and government. The campaign could also impact privacy compliance obligations under GDPR if personal data is stolen or misused.
Mitigation Recommendations
To mitigate this threat, European organizations should implement a multi-layered approach beyond generic advice: 1) Enforce strict browser extension policies via enterprise management tools such as Google Workspace Admin Console or Microsoft Endpoint Manager to whitelist only approved extensions and block all others. 2) Conduct regular audits of installed extensions on corporate devices to detect and remove unauthorized or suspicious ones. 3) Educate users specifically about the risks of installing extensions from unverified sources, emphasizing the dangers of extensions impersonating well-known brands and the importance of verifying publisher information. 4) Deploy network monitoring solutions capable of detecting unusual outbound connections or traffic patterns indicative of proxying or data exfiltration from browser extensions. 5) Integrate endpoint detection and response (EDR) tools that can identify suspicious script injections or abnormal browser behaviors. 6) Collaborate with security vendors to update threat intelligence feeds with indicators of compromise related to this campaign for proactive detection. 7) Encourage the use of multi-factor authentication (MFA) to reduce the impact of stolen credentials. 8) Regularly review and update browser and extension security settings to limit permissions requested by extensions, especially those that can access cookies or modify web content. 9) Engage with Google’s reporting mechanisms to flag and expedite removal of malicious extensions still present on the Chrome Web Store.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.bleepingcomputer.com/news/security/data-stealing-chrome-extensions-impersonate-fortinet-youtube-vpns/"]
- Adversary
- Pulse Id
- 682f07b89e80683352ba4d5a
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domaincalendly-director.com | — | |
domaincalendlydaily.world | — | |
domaincalendlydocker.com | — | |
domaindebank-extension.world | — | |
domaindebank.click | — | |
domaindebank.sbs | — | |
domaindeepseek-ai.link | — | |
domainearthvpn.top | — | |
domainflight-radar.life | — | |
domainforti-vpn.com | — | |
domainfortivnp.com | — | |
domaininfograph.top | — | |
domainiron-tunnel.com | — | |
domainirontunnel.world | — | |
domainmadgicx-plus.com | — | |
domainmadgicxads.world | — | |
domainorchid-vpn.com | — | |
domainraccoon-vpn.world | — | |
domainsimilar-net.com | — | |
domainsoul-vpn.com | — | |
domainwhale-alert.life | — | |
domainwhale-alerts.org | — | |
domainworkfront-plus.com | — | |
domainyoutube-vision.com | — | |
domainyoutube-vision.world | — |
Threat ID: 682f08eb0acd01a249258e9b
Added to database: 5/22/2025, 11:22:19 AM
Last enriched: 6/22/2025, 1:50:10 AM
Last updated: 7/30/2025, 4:08:58 PM
Views: 24
Related Threats
"Click to Allow" Robot Exposes Online Fraud Empire
MediumWindows OOBE Breakout Revived
MediumFake Tesla Websites Scams
MediumPhishing Attack: Deploying Malware on Indian Defense BOSS Linux
MediumExposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.