Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

0
Medium
Vulnerability
Published: Fri Feb 13 2026 (02/13/2026, 11:25:00 UTC)
Source: The Hacker News

Description

A malicious Google Chrome extension named CL Suite, masquerading as a tool to scrape Meta Business Suite data and facilitate 2FA code generation, has been discovered stealing sensitive business data, emails, and browsing history. The extension targets data associated with Meta Business Suite and Facebook Business Manager, compromising confidentiality and potentially enabling further attacks. Although no known exploits in the wild have been reported yet, the extension’s capabilities pose a significant risk to organizations relying on these platforms. The threat exploits user trust in browser extensions and requires installation by the user, making social engineering a key factor in exploitation. European organizations using Meta Business Suite for business operations are at risk of data leakage and unauthorized access. Mitigation involves strict extension management policies, user awareness training, and monitoring for suspicious extension behavior. Countries with high adoption of Meta business tools and significant digital marketing sectors, such as the UK, Germany, and France, are most likely to be affected. Given the medium severity rating and the nature of data targeted, the threat is assessed as high severity due to the potential impact on confidentiality and business operations.

AI-Powered Analysis

AILast updated: 02/14/2026, 12:17:16 UTC

Technical Analysis

The threat involves a malicious Google Chrome extension named CL Suite (ID: jkphinfhmfkckkcnifhjiplhfoiefffl) that has been identified by cybersecurity researchers as designed to steal sensitive data from users of Meta Business Suite and Facebook Business Manager. Marketed as a legitimate tool to scrape business data, remove verification pop-ups, and generate two-factor authentication codes, the extension instead exfiltrates business-related information including emails, browsing history, and other data accessible through the browser session. The extension abuses the permissions granted by users upon installation to access and transmit data covertly. This attack vector leverages the trust users place in browser extensions and the widespread use of Meta’s business platforms for digital marketing and business management. Although no active exploitation campaigns have been reported, the potential for data theft and subsequent misuse is significant. The attack requires user installation, implying social engineering or deceptive marketing tactics are used to propagate the extension. The absence of a patch or removal mechanism from official sources complicates mitigation. The threat primarily impacts confidentiality and integrity of business data, with possible downstream effects on availability if attackers leverage stolen credentials for further compromise. The medium severity rating reflects the current scope and ease of exploitation, but the business impact can be substantial, especially for organizations heavily reliant on Meta’s business tools.

Potential Impact

European organizations using Meta Business Suite and Facebook Business Manager risk significant data breaches involving sensitive business information, emails, and browsing histories. Such data theft can lead to intellectual property loss, competitive disadvantage, and exposure of confidential communications. Compromised credentials or session data may enable attackers to conduct fraudulent activities, manipulate business accounts, or launch further attacks such as phishing or ransomware. The reputational damage and regulatory consequences under GDPR for failing to protect personal and business data can be severe. Digital marketing agencies, e-commerce businesses, and enterprises with substantial online presence are particularly vulnerable. The threat undermines trust in browser extensions and complicates secure use of cloud-based business management tools. Although exploitation requires user action, the widespread use of Chrome and Meta business platforms in Europe increases the attack surface. The impact extends beyond individual users to organizational security posture and compliance obligations.

Mitigation Recommendations

Implement strict browser extension policies restricting installation to vetted and approved extensions only, enforced via enterprise management tools such as Group Policy or Chrome Enterprise policies. Conduct regular audits of installed extensions and remove any unrecognized or suspicious ones. Educate employees about the risks of installing unauthorized browser extensions and train them to recognize social engineering tactics used to promote malicious extensions. Monitor network traffic and endpoint logs for unusual data exfiltration patterns or connections to suspicious domains associated with the extension. Encourage use of multi-factor authentication methods that do not rely solely on browser-based 2FA code generation. Coordinate with Meta and browser vendors to report and expedite removal of malicious extensions from official stores. Employ endpoint protection solutions capable of detecting malicious browser extensions and anomalous behaviors. Regularly update security awareness materials to include emerging threats related to browser extensions and cloud service integrations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/malicious-chrome-extensions-caught.html","fetched":true,"fetchedAt":"2026-02-14T12:16:31.388Z","wordCount":1953}

Threat ID: 699067a1c9e1ff5ad8890c75

Added to database: 2/14/2026, 12:16:33 PM

Last enriched: 2/14/2026, 12:17:16 PM

Last updated: 2/15/2026, 12:50:32 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats