Hidden Threats of Dual-Function Malware Found in Chrome Extensions
An unknown threat actor has been creating malicious Chrome browser extensions since February 2024, using fake websites to lure users into installing them. These extensions have dual functionality, appearing to work as intended while also connecting to malicious servers to steal user data and execute arbitrary code. The extensions request excessive permissions and use various techniques to bypass security measures. They communicate with actor-controlled API domains, sending encrypted system information and receiving dynamic rules and code. The malicious activities include cookie theft, traffic manipulation, and potential account compromises. Over 100 fake websites and extensions have been deployed, exploiting current trends to attract users. The Chrome Web Store has removed some extensions, but the actor's persistence poses an ongoing threat to users seeking productivity tools and browser enhancements.
AI Analysis
Technical Summary
Since February 2024, an unknown threat actor has been deploying a widespread campaign involving malicious Chrome browser extensions distributed via over 100 fake websites. These extensions exhibit dual-functionality: they provide legitimate or seemingly useful browser features to avoid suspicion while simultaneously performing covert malicious activities. Upon installation, the extensions request excessive permissions that enable them to access sensitive browser data and system information. They establish encrypted communications with attacker-controlled API endpoints to exfiltrate data and receive dynamic commands and code updates, allowing the malware to adapt and evade detection. The malicious capabilities include stealing cookies, which can lead to session hijacking and account compromises, manipulating web traffic to alter user interactions or inject malicious content, and executing arbitrary code within the browser context. The extensions employ various evasion techniques to bypass Chrome’s security mechanisms and detection by security tools. Despite some removals by the Chrome Web Store, the actor remains persistent, continuously creating new fake websites and extensions that exploit trending topics to lure users seeking productivity tools or browser enhancements. This campaign leverages a broad range of tactics, techniques, and procedures (TTPs) including credential access, system information discovery, command and control communication, and code injection, as indicated by the referenced MITRE ATT&CK techniques (e.g., T1113, T1033, T1114, T1119, T1082, T1071, T1176, T1140, T1555, T1185, T1016, T1059, T1083, T1102, T1573, T1056, T1012, T1132, T1189, T1124). The campaign’s sophistication and persistence pose a significant threat to users and organizations relying on Chrome extensions for daily operations.
Potential Impact
For European organizations, this threat can lead to substantial confidentiality breaches through the theft of cookies and credentials, enabling unauthorized access to corporate accounts and sensitive data. The arbitrary code execution capability within the browser context can facilitate further compromise of internal networks, lateral movement, or deployment of additional malware. Traffic manipulation may disrupt normal business operations, cause data integrity issues, or facilitate phishing and fraud. The campaign’s use of dynamic command and control infrastructure complicates detection and remediation efforts, increasing the risk of prolonged undetected presence. Organizations with employees who frequently use Chrome extensions, especially those in sectors handling sensitive personal or financial data (e.g., finance, healthcare, government), are at elevated risk. The persistence of the threat actor and their exploitation of trending topics to lure users also increase the likelihood of infection. This can result in reputational damage, regulatory penalties under GDPR due to data breaches, and operational disruptions.
Mitigation Recommendations
1. Implement strict browser extension policies via enterprise management tools to allow installation only from trusted sources and whitelist approved extensions. 2. Conduct regular audits of installed browser extensions across the organization to identify and remove unauthorized or suspicious ones. 3. Educate employees about the risks of installing extensions from unverified websites and the importance of verifying extension legitimacy via official stores and reviews. 4. Deploy endpoint detection and response (EDR) solutions capable of monitoring browser processes and network traffic for anomalous behaviors such as unusual API communications or encrypted data exfiltration. 5. Utilize network security controls to block known malicious API domains and monitor DNS queries for suspicious patterns related to the campaign. 6. Enforce multi-factor authentication (MFA) on all critical accounts to mitigate the impact of credential theft. 7. Regularly update and patch browsers and security tools to leverage the latest protections against extension-based threats. 8. Collaborate with threat intelligence providers to stay informed about emerging malicious extensions and indicators of compromise related to this campaign. 9. Consider deploying browser isolation technologies for high-risk users to contain potential malicious extension activities. 10. Implement strict data access controls and monitor for unusual account activities that may indicate compromise stemming from this threat.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Ireland
Indicators of Compromise
- domain: ad-eye.help
- domain: ad-guardian.world
- domain: ad-scope.world
- domain: ad-seeker.world
- domain: ad-spy.world
- domain: ad-vision.click
- domain: ad-vision.top
- domain: addetective.world
- domain: adelephant.world
- domain: adtwin.world
- domain: aml-sector.world
- domain: amlsector.com
- domain: analytics-box.world
- domain: blurflewhack.top
- domain: calendly-director.com
- domain: calendlydaily.world
- domain: calendlydocker.com
- domain: cookie-whitelist.com
- domain: creativehunter.world
- domain: creativepeek.world
- domain: crypto-whale.info
- domain: crypto-whale.top
- domain: cryptowhalesvision.world
- domain: datavibe.sbs
- domain: datazen.sbs
- domain: debank-extension.world
- domain: debank.click
- domain: debank.sbs
- domain: deepseek-ai.link
- domain: digigtalneo.top
- domain: digigtalwow.top
- domain: e-xt.top
- domain: earthvpn.top
- domain: eventphere.com
- domain: fizzlepopcorn.top
- domain: flibberwump.top
- domain: flight-radar.life
- domain: floopdoodle.top
- domain: forti-vpn.com
- domain: fortivnp.com
- domain: glimmerbloop.top
- domain: infograph.top
- domain: infonet.sbs
- domain: infosync.top
- domain: ioapp.sbs
- domain: iochange.top
- domain: iohub.sbs
- domain: ioonline.top
- domain: iospace.top
- domain: iron-tunnel.com
- domain: irontunnel.world
- domain: jibberjot.top
- domain: jumblefizz.top
- domain: lockads.org
- domain: madgicx-plus.com
- domain: madgicxads.world
- domain: manusai.sbs
- domain: meta-guests.com
- domain: meta-spy.help
- domain: meta-spy365.com
- domain: noodlequack.top
- domain: orchid-vpn.com
- domain: privacy-shield.world
- domain: quirkleblip.top
- domain: quizzlepuff.top
- domain: raccoon-vpn.world
- domain: safesurf.world
- domain: similar-net.com
- domain: siteanalyzer.world
- domain: sitestats.world
- domain: snickerdoodle.top
- domain: snogglewomp.top
- domain: soul-vpn.com
- domain: spaceball.top
- domain: sprocketwhirl.top
- domain: spylens.world
- domain: squirrel-wallet.world
- domain: twin-web.world
- domain: twizzleflap.top
- domain: web-analytics.top
- domain: web-metrics.link
- domain: webinsight.world
- domain: webwatch.world
- domain: whale-alert.life
- domain: whale-alerts.org
- domain: wibblywob.top
- domain: wobblefizz.top
- domain: wobbleguff.top
- domain: workfront-plus.com
- domain: wti-analytics.com
- domain: wtigroups.com
- domain: x-theme.world
- domain: youtube-vision.com
- domain: youtube-vision.world
- domain: zingleflap.top
- domain: zorpleflux.top
- domain: api.glimmerbloop.top
- domain: api.infograph.top
- domain: api.sprocketwhirl.top
- domain: api.zorpleflux.top
Hidden Threats of Dual-Function Malware Found in Chrome Extensions
Description
An unknown threat actor has been creating malicious Chrome browser extensions since February 2024, using fake websites to lure users into installing them. These extensions have dual functionality, appearing to work as intended while also connecting to malicious servers to steal user data and execute arbitrary code. The extensions request excessive permissions and use various techniques to bypass security measures. They communicate with actor-controlled API domains, sending encrypted system information and receiving dynamic rules and code. The malicious activities include cookie theft, traffic manipulation, and potential account compromises. Over 100 fake websites and extensions have been deployed, exploiting current trends to attract users. The Chrome Web Store has removed some extensions, but the actor's persistence poses an ongoing threat to users seeking productivity tools and browser enhancements.
AI-Powered Analysis
Technical Analysis
Since February 2024, an unknown threat actor has been deploying a widespread campaign involving malicious Chrome browser extensions distributed via over 100 fake websites. These extensions exhibit dual-functionality: they provide legitimate or seemingly useful browser features to avoid suspicion while simultaneously performing covert malicious activities. Upon installation, the extensions request excessive permissions that enable them to access sensitive browser data and system information. They establish encrypted communications with attacker-controlled API endpoints to exfiltrate data and receive dynamic commands and code updates, allowing the malware to adapt and evade detection. The malicious capabilities include stealing cookies, which can lead to session hijacking and account compromises, manipulating web traffic to alter user interactions or inject malicious content, and executing arbitrary code within the browser context. The extensions employ various evasion techniques to bypass Chrome’s security mechanisms and detection by security tools. Despite some removals by the Chrome Web Store, the actor remains persistent, continuously creating new fake websites and extensions that exploit trending topics to lure users seeking productivity tools or browser enhancements. This campaign leverages a broad range of tactics, techniques, and procedures (TTPs) including credential access, system information discovery, command and control communication, and code injection, as indicated by the referenced MITRE ATT&CK techniques (e.g., T1113, T1033, T1114, T1119, T1082, T1071, T1176, T1140, T1555, T1185, T1016, T1059, T1083, T1102, T1573, T1056, T1012, T1132, T1189, T1124). The campaign’s sophistication and persistence pose a significant threat to users and organizations relying on Chrome extensions for daily operations.
Potential Impact
For European organizations, this threat can lead to substantial confidentiality breaches through the theft of cookies and credentials, enabling unauthorized access to corporate accounts and sensitive data. The arbitrary code execution capability within the browser context can facilitate further compromise of internal networks, lateral movement, or deployment of additional malware. Traffic manipulation may disrupt normal business operations, cause data integrity issues, or facilitate phishing and fraud. The campaign’s use of dynamic command and control infrastructure complicates detection and remediation efforts, increasing the risk of prolonged undetected presence. Organizations with employees who frequently use Chrome extensions, especially those in sectors handling sensitive personal or financial data (e.g., finance, healthcare, government), are at elevated risk. The persistence of the threat actor and their exploitation of trending topics to lure users also increase the likelihood of infection. This can result in reputational damage, regulatory penalties under GDPR due to data breaches, and operational disruptions.
Mitigation Recommendations
1. Implement strict browser extension policies via enterprise management tools to allow installation only from trusted sources and whitelist approved extensions. 2. Conduct regular audits of installed browser extensions across the organization to identify and remove unauthorized or suspicious ones. 3. Educate employees about the risks of installing extensions from unverified websites and the importance of verifying extension legitimacy via official stores and reviews. 4. Deploy endpoint detection and response (EDR) solutions capable of monitoring browser processes and network traffic for anomalous behaviors such as unusual API communications or encrypted data exfiltration. 5. Utilize network security controls to block known malicious API domains and monitor DNS queries for suspicious patterns related to the campaign. 6. Enforce multi-factor authentication (MFA) on all critical accounts to mitigate the impact of credential theft. 7. Regularly update and patch browsers and security tools to leverage the latest protections against extension-based threats. 8. Collaborate with threat intelligence providers to stay informed about emerging malicious extensions and indicators of compromise related to this campaign. 9. Consider deploying browser isolation technologies for high-risk users to contain potential malicious extension activities. 10. Implement strict data access controls and monitor for unusual account activities that may indicate compromise stemming from this threat.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://dti.domaintools.com/dual-function-malware-chrome-extensions","https://github.com/DomainTools/SecuritySnacks/blob/main/2025/DualFunction-Malware-Chrome-Extensions"]
- Adversary
- Pulse Id
- 682dfaa431bd4e9a598464cc
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainad-eye.help | — | |
domainad-guardian.world | — | |
domainad-scope.world | — | |
domainad-seeker.world | — | |
domainad-spy.world | — | |
domainad-vision.click | — | |
domainad-vision.top | — | |
domainaddetective.world | — | |
domainadelephant.world | — | |
domainadtwin.world | — | |
domainaml-sector.world | — | |
domainamlsector.com | — | |
domainanalytics-box.world | — | |
domainblurflewhack.top | — | |
domaincalendly-director.com | — | |
domaincalendlydaily.world | — | |
domaincalendlydocker.com | — | |
domaincookie-whitelist.com | — | |
domaincreativehunter.world | — | |
domaincreativepeek.world | — | |
domaincrypto-whale.info | — | |
domaincrypto-whale.top | — | |
domaincryptowhalesvision.world | — | |
domaindatavibe.sbs | — | |
domaindatazen.sbs | — | |
domaindebank-extension.world | — | |
domaindebank.click | — | |
domaindebank.sbs | — | |
domaindeepseek-ai.link | — | |
domaindigigtalneo.top | — | |
domaindigigtalwow.top | — | |
domaine-xt.top | — | |
domainearthvpn.top | — | |
domaineventphere.com | — | |
domainfizzlepopcorn.top | — | |
domainflibberwump.top | — | |
domainflight-radar.life | — | |
domainfloopdoodle.top | — | |
domainforti-vpn.com | — | |
domainfortivnp.com | — | |
domainglimmerbloop.top | — | |
domaininfograph.top | — | |
domaininfonet.sbs | — | |
domaininfosync.top | — | |
domainioapp.sbs | — | |
domainiochange.top | — | |
domainiohub.sbs | — | |
domainioonline.top | — | |
domainiospace.top | — | |
domainiron-tunnel.com | — | |
domainirontunnel.world | — | |
domainjibberjot.top | — | |
domainjumblefizz.top | — | |
domainlockads.org | — | |
domainmadgicx-plus.com | — | |
domainmadgicxads.world | — | |
domainmanusai.sbs | — | |
domainmeta-guests.com | — | |
domainmeta-spy.help | — | |
domainmeta-spy365.com | — | |
domainnoodlequack.top | — | |
domainorchid-vpn.com | — | |
domainprivacy-shield.world | — | |
domainquirkleblip.top | — | |
domainquizzlepuff.top | — | |
domainraccoon-vpn.world | — | |
domainsafesurf.world | — | |
domainsimilar-net.com | — | |
domainsiteanalyzer.world | — | |
domainsitestats.world | — | |
domainsnickerdoodle.top | — | |
domainsnogglewomp.top | — | |
domainsoul-vpn.com | — | |
domainspaceball.top | — | |
domainsprocketwhirl.top | — | |
domainspylens.world | — | |
domainsquirrel-wallet.world | — | |
domaintwin-web.world | — | |
domaintwizzleflap.top | — | |
domainweb-analytics.top | — | |
domainweb-metrics.link | — | |
domainwebinsight.world | — | |
domainwebwatch.world | — | |
domainwhale-alert.life | — | |
domainwhale-alerts.org | — | |
domainwibblywob.top | — | |
domainwobblefizz.top | — | |
domainwobbleguff.top | — | |
domainworkfront-plus.com | — | |
domainwti-analytics.com | — | |
domainwtigroups.com | — | |
domainx-theme.world | — | |
domainyoutube-vision.com | — | |
domainyoutube-vision.world | — | |
domainzingleflap.top | — | |
domainzorpleflux.top | — | |
domainapi.glimmerbloop.top | — | |
domainapi.infograph.top | — | |
domainapi.sprocketwhirl.top | — | |
domainapi.zorpleflux.top | — |
Threat ID: 682e0bf6c4522896dcc4356c
Added to database: 5/21/2025, 5:23:02 PM
Last enriched: 6/21/2025, 2:06:54 PM
Last updated: 8/20/2025, 7:26:36 AM
Views: 18
Related Threats
Attacks Targeting Linux SSH Servers to Install SVF DDoS Bot
MediumCryptoJacking is dead: long live CryptoJacking
MediumNoodlophile Stealer Evolves: Targeted Copyright Phishing Hits Enterprises with Social Media Footprints
MediumSalty 2FA: Undetected PhaaS Hitting US and EU Industries
MediumRansomware incidents in Japan during the first half of 2025
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.