Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Fake AI Assistant Extensions Targeting 260,000 Chrome Users via injected iframes

0
Medium
Published: Mon Feb 16 2026 (02/16/2026, 14:28:59 UTC)
Source: AlienVault OTX General

Description

A coordinated campaign of Chrome extensions posing as AI assistants has been uncovered, affecting over 260,000 users. These extensions, while appearing legitimate, embed remote, server-controlled interfaces inside extension-controlled surfaces, granting access to sensitive browser capabilities. The campaign consists of 30 different extensions sharing the same codebase, permissions, and backend infrastructure. Key features include remote iframe as the core UI, page content extraction, voice recognition capability, and Gmail integration. The extensions communicate with infrastructure under the tapnetic.pro domain, using subdomain segmentation for logical separation. The campaign employs extension spraying tactics to evade takedowns and quickly restore distribution. This approach breaks the browser security model, potentially allowing data harvesting and user behavior monitoring.

AI-Powered Analysis

AILast updated: 02/17/2026, 16:29:49 UTC

Technical Analysis

This threat campaign involves a network of 30 malicious Chrome extensions that impersonate legitimate AI assistant tools to deceive users into installation. These extensions share a common codebase and backend infrastructure, communicating with command and control servers hosted under the tapnetic.pro domain and related subdomains. The core malicious technique involves embedding remote iframes controlled by the attacker inside the extension UI, which circumvents Chrome's security model by allowing the attacker to execute arbitrary code and access sensitive browser APIs. The extensions extract page content, capture voice inputs, and integrate with Gmail, enabling comprehensive data harvesting and user behavior monitoring. The campaign uses extension spraying, a tactic where multiple similar extensions are published to the Chrome Web Store to avoid detection and takedown, ensuring persistent distribution. The use of remote iframes as the primary UI is a novel approach that facilitates dynamic control over the extension's behavior and evasion of static detection methods. Although no CVE or known exploits are currently documented, the threat leverages advanced evasion and persistence techniques, making it a significant risk to users and organizations relying on Chrome extensions for productivity. The domains involved (airnetic.space, softnetica.space, tapnetic.pro, tapnetic.space, and claude.tapnetic.pro) serve as infrastructure for command and control and data exfiltration.

Potential Impact

For European organizations, this campaign poses a substantial risk to confidentiality and privacy, as the malicious extensions can harvest sensitive browsing data, email content, and voice inputs. This could lead to leakage of intellectual property, personal data, and corporate communications. The integration with Gmail is particularly concerning for organizations using Google Workspace, as attackers could access sensitive emails and attachments. The widespread scale (260,000+ users) indicates a high likelihood that employees in European companies may have installed these extensions, potentially enabling lateral movement or targeted phishing campaigns. The campaign's ability to evade takedown through extension spraying increases the persistence and reach of the threat. Additionally, the undermining of browser security models could facilitate further exploitation or malware delivery. The medium severity rating reflects the balance between the complexity of exploitation (requiring user installation) and the significant potential impact on data confidentiality and user privacy.

Mitigation Recommendations

European organizations should implement strict policies governing browser extension installation, restricting users to approved extensions only via enterprise policies. Deploy endpoint security solutions capable of detecting suspicious extension behaviors and monitor network traffic for connections to known malicious domains such as tapnetic.pro and its subdomains. Conduct regular audits of installed browser extensions across corporate devices. Educate employees about the risks of installing unverified AI assistant extensions and encourage verification of extension publishers and reviews. Leverage browser security features like extension permission reviews and disable unnecessary permissions such as access to Gmail or voice recognition unless explicitly required. Collaborate with browser vendors to report malicious extensions and support rapid takedown efforts. Employ data loss prevention (DLP) solutions to monitor and block unauthorized data exfiltration attempts. Finally, maintain updated threat intelligence feeds to stay informed about emerging variants of this campaign.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://layerxsecurity.com/blog/aiframe-fake-ai-assistant-extensions-targeting-260000-chrome-users-via-injected-iframes"]
Adversary
null
Pulse Id
699329ab195228ff943fb2bc
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainairnetic.space
domainsoftnetica.space
domaintapnetic.pro
domaintapnetic.space
domainclaude.tapnetic.pro

Threat ID: 6994942680d747be20c100a4

Added to database: 2/17/2026, 4:15:34 PM

Last enriched: 2/17/2026, 4:29:49 PM

Last updated: 2/20/2026, 11:07:42 PM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats