Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

The AI Frame Campaign Continues

0
Medium
Published: Fri Apr 24 2026 (04/24/2026, 05:05:19 UTC)
Source: AlienVault OTX General

Description

A malicious Chrome extension impersonating Google's Authenticator application has been identified as part of an ongoing campaign active since early 2026. The extension requests excessive permissions and contains dormant infrastructure suggesting a staged deployment model where malicious updates can be delivered without requiring further user approval. This extension is linked to at least six others through a shared developer front, with two already carrying fully operational malicious payloads. These extensions utilize hidden iframes to inject attacker-controlled content, deploy fraudulent paywalls for free services, and maintain bidirectional communication with command and control servers. The infrastructure maps directly to the AiFrame campaign, which has reportedly compromised over 260,000 users from 2025 to present, marking a continued evolution of this threat.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/24/2026, 08:36:02 UTC

Technical Analysis

The AiFrame campaign involves a malicious Chrome extension masquerading as Google's Authenticator application. It requests broad permissions and includes dormant components that allow attackers to push malicious updates without further user consent. This extension is connected to a cluster of at least six extensions sharing a developer front, with two confirmed to have fully operational malicious payloads. The extensions exploit hidden iframes to inject attacker-controlled content into web pages, implement fraudulent paywalls to monetize free services, and establish bidirectional communication with command and control infrastructure. The campaign has been active since 2025, compromising over 260,000 users, and represents a sophisticated, evolving threat targeting browser security and two-factor authentication mechanisms.

Potential Impact

Users of the malicious Chrome extension risk unauthorized access to their credentials and two-factor authentication data due to iframe injection and credential theft techniques. The fraudulent paywalls disrupt legitimate access to free services, potentially causing financial loss or service denial. The staged deployment model allows attackers to update the extension with new malicious capabilities without user approval, increasing the threat's persistence and adaptability. The campaign's scale, with over 260,000 compromised users, indicates significant impact on user security and privacy.

Mitigation Recommendations

No official patch or remediation is currently available for this threat. Users should immediately uninstall any suspicious or unverified Chrome extensions, especially those impersonating legitimate authentication apps. Avoid granting excessive permissions to browser extensions and verify developer authenticity before installation. Monitor for updates from browser vendors or security advisories regarding this campaign. Since this is not a cloud service, remediation depends on user action and browser security controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://dti.domaintools.com/securitysnacks/the-ai-frame-campaign-continues"]
Adversary
null
Pulse Id
69eafa0f9d3e61201eac54d4
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domaintapnetic.pro
domainasking-chat-gpt.tapnetic.pro
domainchat-gbt.tapnetic.pro
domainchat-with-gemini.tapnetic.pro
domainairnetic.space
domainclaude.tapnetic.pro
domainai-chat-to-pdf.com
domainheic-to-jpg.pro
domainonlineapp.live
domainsidenox.stream
domainsoftnetica.com
domainwhitelab.studio
domainapi.tapnetic.pro
domainask-gemini.tapnetic.pro
domainauthenticator.tapnetic.pro
domainauthenticator.whitelab.studio
domainbard.tapnetic.pro
domainchat-ai.tapnetic.pro
domainchat-bot-gpt.tapnetic.pro
domainchatgbt.tapnetic.pro
domainchatgpt.tapnetic.pro
domaindeepseek-to-pdf.tapnetic.pro
domaindeepseek.tapnetic.pro
domaingemini.google.tapnetic.pro
domaingemini.tapnetic.pro
domaingrok-chatbot.tapnetic.pro
domaingrok.tapnetic.pro
domainllama.tapnetic.pro
domainwww.tapnetic.pro
domainxai.tapnetic.pro

Threat ID: 69eb280887115cfb68038e95

Added to database: 4/24/2026, 8:21:28 AM

Last enriched: 4/24/2026, 8:36:02 AM

Last updated: 4/25/2026, 6:54:34 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses