Skip to main content

Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware.

Medium
Published: Thu Jul 10 2025 (07/10/2025, 18:29:29 UTC)
Source: AlienVault OTX General

Description

A coordinated campaign of 18 malicious browser extensions infected 2.3 million users across Chrome and Edge. These extensions, including a color picker tool, appeared legitimate with verified badges and high install counts. The RedDirection campaign implemented sophisticated browser hijacking mechanisms, capturing users' browsing data and potentially redirecting them to malicious sites. The malware was introduced through version updates of previously clean extensions, exploiting the auto-update feature of browsers. The campaign demonstrates systemic failures in marketplace security, verification processes, and trust signals, turning productivity tools into surveillance malware. Users are advised to remove affected extensions and monitor their accounts for suspicious activity.

AI-Powered Analysis

AILast updated: 07/10/2025, 22:17:37 UTC

Technical Analysis

The RedDirection campaign is a coordinated malware operation involving 18 malicious browser extensions that collectively infected approximately 2.3 million users of Google Chrome and Microsoft Edge browsers. These extensions initially appeared legitimate, featuring verified badges and high installation counts, which helped them evade suspicion. The attackers exploited the browser auto-update mechanism by initially publishing clean versions of these extensions and then pushing malicious updates, effectively bypassing marketplace security and verification processes. The malicious extensions implemented sophisticated browser hijacking techniques, including capturing users' browsing data and redirecting them to attacker-controlled or malicious websites. This campaign highlights systemic weaknesses in browser extension marketplaces, particularly in the verification and trust model, where productivity tools can be weaponized into surveillance malware. Indicators of compromise include specific hashes, URLs, and domains associated with the campaign's command and control infrastructure. The campaign leverages multiple attack techniques such as credential access (T1056.001), command execution (T1059.007), persistence (T1133), user execution (T1204.002), and data exfiltration (T1571), among others. Although no CVE identifiers or known exploits in the wild are reported, the scale of infection and the stealthy nature of the campaign make it a significant threat to users and organizations relying on browser extensions for daily operations.

Potential Impact

For European organizations, the RedDirection campaign poses a substantial risk to confidentiality and integrity of sensitive data accessed via web browsers. The hijacking and data capture capabilities of the malicious extensions can lead to leakage of corporate credentials, session tokens, and browsing histories, potentially enabling further compromise of internal systems and accounts. The redirection to malicious sites may expose users to phishing, drive-by downloads, or additional malware infections. Given the widespread use of Chrome and Edge in European enterprises and public sectors, the campaign could disrupt business operations, erode trust in browser extension ecosystems, and increase incident response costs. Privacy regulations such as GDPR impose strict requirements on data protection; a breach resulting from this malware could lead to regulatory penalties and reputational damage. The stealthy update mechanism complicates detection and remediation, increasing the window of exposure. Additionally, the campaign's exploitation of trusted marketplaces undermines confidence in software supply chains, which is a critical concern for European cybersecurity frameworks.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy against this threat. First, enforce strict browser extension policies using enterprise management tools to whitelist only vetted and necessary extensions, blocking all others. Regularly audit installed extensions across endpoints to detect and remove any unauthorized or suspicious ones. Employ endpoint detection and response (EDR) solutions with behavioral analytics capable of identifying anomalous browser activity such as unexpected network connections or redirections. Integrate threat intelligence feeds containing the known indicators of compromise (hashes, domains, URLs) to enable proactive blocking and alerting. Educate users about the risks of installing unverified extensions and the importance of monitoring browser behavior. Coordinate with browser vendors to report suspicious extensions and advocate for enhanced verification processes and transparency in extension updates. Finally, implement network-level protections such as DNS filtering and web proxies to block access to known malicious domains associated with the campaign. Continuous monitoring for unusual outbound traffic patterns and rapid response to detected infections are essential to minimize impact.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.koi.security/google-and-microsoft-trusted-them-2-3-million-users-installed-them-they-were-malware-fb4ed4f40ff5"]
Adversary
RedDirection
Pulse Id
68700689f25260953b97788c
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash565ebded7e63cdfa5fcbe5734bdb4281a85d6f21

Url

ValueDescriptionCopy
urlhttps://admitclick.net/api?key=565ebded7e63cdfa5fcbe5734bdb4281a85d6f21&uuid=

Domain

ValueDescriptionCopy
domainadmiitad.com
domainadmitlink.net
domainedmitab.com
domainc.undiscord.com
domainc.untwitter.com
domainc.unyoutube.net

Threat ID: 68703822a83201eaacaa3aea

Added to database: 7/10/2025, 10:01:06 PM

Last enriched: 7/10/2025, 10:17:37 PM

Last updated: 7/11/2025, 12:53:47 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats