Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes.
AI Analysis
Technical Summary
The threat involves a malicious Google Chrome extension named CL Suite (ID: jkphinfhmfkckkcnifhjiplhfoiefffl) that has been identified by cybersecurity researchers as designed to steal sensitive data from users of Meta Business Suite and Facebook Business Manager. Marketed as a legitimate tool to scrape business data, remove verification pop-ups, and generate two-factor authentication codes, the extension instead exfiltrates business-related information including emails, browsing history, and other data accessible through the browser session. The extension abuses the permissions granted by users upon installation to access and transmit data covertly. This attack vector leverages the trust users place in browser extensions and the widespread use of Meta’s business platforms for digital marketing and business management. Although no active exploitation campaigns have been reported, the potential for data theft and subsequent misuse is significant. The attack requires user installation, implying social engineering or deceptive marketing tactics are used to propagate the extension. The absence of a patch or removal mechanism from official sources complicates mitigation. The threat primarily impacts confidentiality and integrity of business data, with possible downstream effects on availability if attackers leverage stolen credentials for further compromise. The medium severity rating reflects the current scope and ease of exploitation, but the business impact can be substantial, especially for organizations heavily reliant on Meta’s business tools.
Potential Impact
European organizations using Meta Business Suite and Facebook Business Manager risk significant data breaches involving sensitive business information, emails, and browsing histories. Such data theft can lead to intellectual property loss, competitive disadvantage, and exposure of confidential communications. Compromised credentials or session data may enable attackers to conduct fraudulent activities, manipulate business accounts, or launch further attacks such as phishing or ransomware. The reputational damage and regulatory consequences under GDPR for failing to protect personal and business data can be severe. Digital marketing agencies, e-commerce businesses, and enterprises with substantial online presence are particularly vulnerable. The threat undermines trust in browser extensions and complicates secure use of cloud-based business management tools. Although exploitation requires user action, the widespread use of Chrome and Meta business platforms in Europe increases the attack surface. The impact extends beyond individual users to organizational security posture and compliance obligations.
Mitigation Recommendations
Implement strict browser extension policies restricting installation to vetted and approved extensions only, enforced via enterprise management tools such as Group Policy or Chrome Enterprise policies. Conduct regular audits of installed extensions and remove any unrecognized or suspicious ones. Educate employees about the risks of installing unauthorized browser extensions and train them to recognize social engineering tactics used to promote malicious extensions. Monitor network traffic and endpoint logs for unusual data exfiltration patterns or connections to suspicious domains associated with the extension. Encourage use of multi-factor authentication methods that do not rely solely on browser-based 2FA code generation. Coordinate with Meta and browser vendors to report and expedite removal of malicious extensions from official stores. Employ endpoint protection solutions capable of detecting malicious browser extensions and anomalous behaviors. Regularly update security awareness materials to include emerging threats related to browser extensions and cloud service integrations.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
Description
Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business Suite data, remove verification pop-ups, and generate two-factor authentication (2FA) codes.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The threat involves a malicious Google Chrome extension named CL Suite (ID: jkphinfhmfkckkcnifhjiplhfoiefffl) that has been identified by cybersecurity researchers as designed to steal sensitive data from users of Meta Business Suite and Facebook Business Manager. Marketed as a legitimate tool to scrape business data, remove verification pop-ups, and generate two-factor authentication codes, the extension instead exfiltrates business-related information including emails, browsing history, and other data accessible through the browser session. The extension abuses the permissions granted by users upon installation to access and transmit data covertly. This attack vector leverages the trust users place in browser extensions and the widespread use of Meta’s business platforms for digital marketing and business management. Although no active exploitation campaigns have been reported, the potential for data theft and subsequent misuse is significant. The attack requires user installation, implying social engineering or deceptive marketing tactics are used to propagate the extension. The absence of a patch or removal mechanism from official sources complicates mitigation. The threat primarily impacts confidentiality and integrity of business data, with possible downstream effects on availability if attackers leverage stolen credentials for further compromise. The medium severity rating reflects the current scope and ease of exploitation, but the business impact can be substantial, especially for organizations heavily reliant on Meta’s business tools.
Potential Impact
European organizations using Meta Business Suite and Facebook Business Manager risk significant data breaches involving sensitive business information, emails, and browsing histories. Such data theft can lead to intellectual property loss, competitive disadvantage, and exposure of confidential communications. Compromised credentials or session data may enable attackers to conduct fraudulent activities, manipulate business accounts, or launch further attacks such as phishing or ransomware. The reputational damage and regulatory consequences under GDPR for failing to protect personal and business data can be severe. Digital marketing agencies, e-commerce businesses, and enterprises with substantial online presence are particularly vulnerable. The threat undermines trust in browser extensions and complicates secure use of cloud-based business management tools. Although exploitation requires user action, the widespread use of Chrome and Meta business platforms in Europe increases the attack surface. The impact extends beyond individual users to organizational security posture and compliance obligations.
Mitigation Recommendations
Implement strict browser extension policies restricting installation to vetted and approved extensions only, enforced via enterprise management tools such as Group Policy or Chrome Enterprise policies. Conduct regular audits of installed extensions and remove any unrecognized or suspicious ones. Educate employees about the risks of installing unauthorized browser extensions and train them to recognize social engineering tactics used to promote malicious extensions. Monitor network traffic and endpoint logs for unusual data exfiltration patterns or connections to suspicious domains associated with the extension. Encourage use of multi-factor authentication methods that do not rely solely on browser-based 2FA code generation. Coordinate with Meta and browser vendors to report and expedite removal of malicious extensions from official stores. Employ endpoint protection solutions capable of detecting malicious browser extensions and anomalous behaviors. Regularly update security awareness materials to include emerging threats related to browser extensions and cloud service integrations.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/malicious-chrome-extensions-caught.html","fetched":true,"fetchedAt":"2026-02-14T12:16:31.388Z","wordCount":1953}
Threat ID: 699067a1c9e1ff5ad8890c75
Added to database: 2/14/2026, 12:16:33 PM
Last enriched: 2/14/2026, 12:17:16 PM
Last updated: 4/1/2026, 2:59:46 AM
Views: 304
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.