Skip to main content

Hidden Threats of Dual-Function Malware Found in Chrome Extensions

Medium
Published: Wed May 21 2025 (05/21/2025, 16:09:08 UTC)
Source: AlienVault OTX General

Description

An unknown threat actor has been creating malicious Chrome browser extensions since February 2024, using fake websites to lure users into installing them. These extensions have dual functionality, appearing to work as intended while also connecting to malicious servers to steal user data and execute arbitrary code. The extensions request excessive permissions and use various techniques to bypass security measures. They communicate with actor-controlled API domains, sending encrypted system information and receiving dynamic rules and code. The malicious activities include cookie theft, traffic manipulation, and potential account compromises. Over 100 fake websites and extensions have been deployed, exploiting current trends to attract users. The Chrome Web Store has removed some extensions, but the actor's persistence poses an ongoing threat to users seeking productivity tools and browser enhancements.

AI-Powered Analysis

AILast updated: 06/21/2025, 14:06:54 UTC

Technical Analysis

Since February 2024, an unknown threat actor has been deploying a widespread campaign involving malicious Chrome browser extensions distributed via over 100 fake websites. These extensions exhibit dual-functionality: they provide legitimate or seemingly useful browser features to avoid suspicion while simultaneously performing covert malicious activities. Upon installation, the extensions request excessive permissions that enable them to access sensitive browser data and system information. They establish encrypted communications with attacker-controlled API endpoints to exfiltrate data and receive dynamic commands and code updates, allowing the malware to adapt and evade detection. The malicious capabilities include stealing cookies, which can lead to session hijacking and account compromises, manipulating web traffic to alter user interactions or inject malicious content, and executing arbitrary code within the browser context. The extensions employ various evasion techniques to bypass Chrome’s security mechanisms and detection by security tools. Despite some removals by the Chrome Web Store, the actor remains persistent, continuously creating new fake websites and extensions that exploit trending topics to lure users seeking productivity tools or browser enhancements. This campaign leverages a broad range of tactics, techniques, and procedures (TTPs) including credential access, system information discovery, command and control communication, and code injection, as indicated by the referenced MITRE ATT&CK techniques (e.g., T1113, T1033, T1114, T1119, T1082, T1071, T1176, T1140, T1555, T1185, T1016, T1059, T1083, T1102, T1573, T1056, T1012, T1132, T1189, T1124). The campaign’s sophistication and persistence pose a significant threat to users and organizations relying on Chrome extensions for daily operations.

Potential Impact

For European organizations, this threat can lead to substantial confidentiality breaches through the theft of cookies and credentials, enabling unauthorized access to corporate accounts and sensitive data. The arbitrary code execution capability within the browser context can facilitate further compromise of internal networks, lateral movement, or deployment of additional malware. Traffic manipulation may disrupt normal business operations, cause data integrity issues, or facilitate phishing and fraud. The campaign’s use of dynamic command and control infrastructure complicates detection and remediation efforts, increasing the risk of prolonged undetected presence. Organizations with employees who frequently use Chrome extensions, especially those in sectors handling sensitive personal or financial data (e.g., finance, healthcare, government), are at elevated risk. The persistence of the threat actor and their exploitation of trending topics to lure users also increase the likelihood of infection. This can result in reputational damage, regulatory penalties under GDPR due to data breaches, and operational disruptions.

Mitigation Recommendations

1. Implement strict browser extension policies via enterprise management tools to allow installation only from trusted sources and whitelist approved extensions. 2. Conduct regular audits of installed browser extensions across the organization to identify and remove unauthorized or suspicious ones. 3. Educate employees about the risks of installing extensions from unverified websites and the importance of verifying extension legitimacy via official stores and reviews. 4. Deploy endpoint detection and response (EDR) solutions capable of monitoring browser processes and network traffic for anomalous behaviors such as unusual API communications or encrypted data exfiltration. 5. Utilize network security controls to block known malicious API domains and monitor DNS queries for suspicious patterns related to the campaign. 6. Enforce multi-factor authentication (MFA) on all critical accounts to mitigate the impact of credential theft. 7. Regularly update and patch browsers and security tools to leverage the latest protections against extension-based threats. 8. Collaborate with threat intelligence providers to stay informed about emerging malicious extensions and indicators of compromise related to this campaign. 9. Consider deploying browser isolation technologies for high-risk users to contain potential malicious extension activities. 10. Implement strict data access controls and monitor for unusual account activities that may indicate compromise stemming from this threat.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://dti.domaintools.com/dual-function-malware-chrome-extensions","https://github.com/DomainTools/SecuritySnacks/blob/main/2025/DualFunction-Malware-Chrome-Extensions"]
Adversary
Pulse Id
682dfaa431bd4e9a598464cc

Indicators of Compromise

Domain

ValueDescriptionCopy
domainad-eye.help
domainad-guardian.world
domainad-scope.world
domainad-seeker.world
domainad-spy.world
domainad-vision.click
domainad-vision.top
domainaddetective.world
domainadelephant.world
domainadtwin.world
domainaml-sector.world
domainamlsector.com
domainanalytics-box.world
domainblurflewhack.top
domaincalendly-director.com
domaincalendlydaily.world
domaincalendlydocker.com
domaincookie-whitelist.com
domaincreativehunter.world
domaincreativepeek.world
domaincrypto-whale.info
domaincrypto-whale.top
domaincryptowhalesvision.world
domaindatavibe.sbs
domaindatazen.sbs
domaindebank-extension.world
domaindebank.click
domaindebank.sbs
domaindeepseek-ai.link
domaindigigtalneo.top
domaindigigtalwow.top
domaine-xt.top
domainearthvpn.top
domaineventphere.com
domainfizzlepopcorn.top
domainflibberwump.top
domainflight-radar.life
domainfloopdoodle.top
domainforti-vpn.com
domainfortivnp.com
domainglimmerbloop.top
domaininfograph.top
domaininfonet.sbs
domaininfosync.top
domainioapp.sbs
domainiochange.top
domainiohub.sbs
domainioonline.top
domainiospace.top
domainiron-tunnel.com
domainirontunnel.world
domainjibberjot.top
domainjumblefizz.top
domainlockads.org
domainmadgicx-plus.com
domainmadgicxads.world
domainmanusai.sbs
domainmeta-guests.com
domainmeta-spy.help
domainmeta-spy365.com
domainnoodlequack.top
domainorchid-vpn.com
domainprivacy-shield.world
domainquirkleblip.top
domainquizzlepuff.top
domainraccoon-vpn.world
domainsafesurf.world
domainsimilar-net.com
domainsiteanalyzer.world
domainsitestats.world
domainsnickerdoodle.top
domainsnogglewomp.top
domainsoul-vpn.com
domainspaceball.top
domainsprocketwhirl.top
domainspylens.world
domainsquirrel-wallet.world
domaintwin-web.world
domaintwizzleflap.top
domainweb-analytics.top
domainweb-metrics.link
domainwebinsight.world
domainwebwatch.world
domainwhale-alert.life
domainwhale-alerts.org
domainwibblywob.top
domainwobblefizz.top
domainwobbleguff.top
domainworkfront-plus.com
domainwti-analytics.com
domainwtigroups.com
domainx-theme.world
domainyoutube-vision.com
domainyoutube-vision.world
domainzingleflap.top
domainzorpleflux.top
domainapi.glimmerbloop.top
domainapi.infograph.top
domainapi.sprocketwhirl.top
domainapi.zorpleflux.top

Threat ID: 682e0bf6c4522896dcc4356c

Added to database: 5/21/2025, 5:23:02 PM

Last enriched: 6/21/2025, 2:06:54 PM

Last updated: 8/20/2025, 7:26:36 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats