Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials. The extensions are advertised as a "multi-location network speed test plug-in" for developers and foreign trade personnel. Both the browser add-ons are available for download as of
AI Analysis
Technical Summary
Cybersecurity researchers identified two malicious Chrome extensions, both named Phantom Shuttle and published by the same developer, which have been available for download since 2017 and 2023 respectively. Marketed as multi-location network speed test tools targeting developers and foreign trade personnel, these extensions deceive users into subscribing for a VPN-like service. Upon subscription, the extensions activate a 'smarty' proxy mode that routes traffic from over 170 targeted domains—including major developer platforms (GitHub, Stack Overflow), cloud providers (AWS, Azure), enterprise services (Cisco, IBM), social media, and adult sites—through attacker-controlled proxies. The extensions inject hardcoded proxy credentials into every HTTP authentication challenge using the chrome.webRequest.onAuthRequired listener, bypassing user prompts and enabling transparent man-in-the-middle interception. This setup allows the attacker to capture and manipulate network traffic in real-time, stealing credentials, cookies, API keys, credit card data, and browsing history. Additionally, the extensions send a heartbeat every 60 seconds to a command-and-control server at phantomshuttle.space, exfiltrating VIP user emails, plaintext passwords, and version info every five minutes. The malicious code modifies bundled JavaScript libraries to facilitate these operations. The subscription payment system, integrated with Alipay and WeChat Pay, and hosting on Alibaba Cloud suggest a China-based threat actor. The inclusion of adult content sites likely serves as leverage for blackmail. The operation has persisted for eight years, highlighting the risk posed by unmanaged browser extensions in enterprise environments. The threat enables comprehensive data theft, session monitoring, and potential supply chain attacks through stolen developer secrets.
Potential Impact
European organizations are at significant risk due to the extensive list of targeted domains that include widely used developer platforms, cloud infrastructure providers, and enterprise solutions critical to business operations. The interception and theft of credentials, API keys, and session tokens can lead to unauthorized access to corporate networks, cloud environments, and sensitive data repositories. This can result in data breaches, intellectual property theft, financial fraud, and disruption of services. The presence of social media and adult content sites in the proxy list increases the risk of reputational damage and blackmail attempts against individuals within organizations. The potential for supply chain attacks via stolen developer secrets could have cascading effects on software integrity and security across European industries. The subscription-based model also means that a persistent and possibly growing user base within Europe may be unknowingly compromised. The stealthy nature of the extensions, combined with their legitimate appearance and functionality, complicates detection and response efforts, increasing the likelihood of prolonged exposure and damage.
Mitigation Recommendations
European organizations should immediately audit and remove the identified Phantom Shuttle extensions from all endpoints. Implement strict browser extension allowlisting policies to prevent installation of unauthorized or suspicious extensions, especially those requesting proxy permissions or involving subscription payments. Deploy endpoint detection solutions capable of monitoring browser extension behavior and network proxy configurations. Network teams should monitor for unusual proxy authentication attempts and inspect traffic for signs of man-in-the-middle interception, particularly targeting the domains listed in the threat. Employ network segmentation and zero trust principles to limit the impact of compromised credentials. Educate users about the risks of installing unverified extensions and subscribing to unknown services. Regularly review and revoke exposed credentials and API keys, and enforce multi-factor authentication on critical services. Collaborate with cloud and platform providers to detect anomalous access patterns that may indicate credential misuse. Finally, maintain updated threat intelligence feeds to identify emerging variants or related threats.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Ireland
Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
Description
Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials. The extensions are advertised as a "multi-location network speed test plug-in" for developers and foreign trade personnel. Both the browser add-ons are available for download as of
AI-Powered Analysis
Technical Analysis
Cybersecurity researchers identified two malicious Chrome extensions, both named Phantom Shuttle and published by the same developer, which have been available for download since 2017 and 2023 respectively. Marketed as multi-location network speed test tools targeting developers and foreign trade personnel, these extensions deceive users into subscribing for a VPN-like service. Upon subscription, the extensions activate a 'smarty' proxy mode that routes traffic from over 170 targeted domains—including major developer platforms (GitHub, Stack Overflow), cloud providers (AWS, Azure), enterprise services (Cisco, IBM), social media, and adult sites—through attacker-controlled proxies. The extensions inject hardcoded proxy credentials into every HTTP authentication challenge using the chrome.webRequest.onAuthRequired listener, bypassing user prompts and enabling transparent man-in-the-middle interception. This setup allows the attacker to capture and manipulate network traffic in real-time, stealing credentials, cookies, API keys, credit card data, and browsing history. Additionally, the extensions send a heartbeat every 60 seconds to a command-and-control server at phantomshuttle.space, exfiltrating VIP user emails, plaintext passwords, and version info every five minutes. The malicious code modifies bundled JavaScript libraries to facilitate these operations. The subscription payment system, integrated with Alipay and WeChat Pay, and hosting on Alibaba Cloud suggest a China-based threat actor. The inclusion of adult content sites likely serves as leverage for blackmail. The operation has persisted for eight years, highlighting the risk posed by unmanaged browser extensions in enterprise environments. The threat enables comprehensive data theft, session monitoring, and potential supply chain attacks through stolen developer secrets.
Potential Impact
European organizations are at significant risk due to the extensive list of targeted domains that include widely used developer platforms, cloud infrastructure providers, and enterprise solutions critical to business operations. The interception and theft of credentials, API keys, and session tokens can lead to unauthorized access to corporate networks, cloud environments, and sensitive data repositories. This can result in data breaches, intellectual property theft, financial fraud, and disruption of services. The presence of social media and adult content sites in the proxy list increases the risk of reputational damage and blackmail attempts against individuals within organizations. The potential for supply chain attacks via stolen developer secrets could have cascading effects on software integrity and security across European industries. The subscription-based model also means that a persistent and possibly growing user base within Europe may be unknowingly compromised. The stealthy nature of the extensions, combined with their legitimate appearance and functionality, complicates detection and response efforts, increasing the likelihood of prolonged exposure and damage.
Mitigation Recommendations
European organizations should immediately audit and remove the identified Phantom Shuttle extensions from all endpoints. Implement strict browser extension allowlisting policies to prevent installation of unauthorized or suspicious extensions, especially those requesting proxy permissions or involving subscription payments. Deploy endpoint detection solutions capable of monitoring browser extension behavior and network proxy configurations. Network teams should monitor for unusual proxy authentication attempts and inspect traffic for signs of man-in-the-middle interception, particularly targeting the domains listed in the threat. Employ network segmentation and zero trust principles to limit the impact of compromised credentials. Educate users about the risks of installing unverified extensions and subscribing to unknown services. Regularly review and revoke exposed credentials and API keys, and enforce multi-factor authentication on critical services. Collaborate with cloud and platform providers to detect anomalous access patterns that may indicate credential misuse. Finally, maintain updated threat intelligence feeds to identify emerging variants or related threats.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/two-chrome-extensions-caught-secretly.html","fetched":true,"fetchedAt":"2025-12-23T16:03:47.005Z","wordCount":1342}
Threat ID: 694abd65e971240e2a7b89a2
Added to database: 12/23/2025, 4:03:49 PM
Last enriched: 12/23/2025, 4:04:06 PM
Last updated: 12/23/2025, 6:42:28 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-45493: n/a
MediumCVE-2024-10396: CWE-772 Missing Release of Resource after Effective Lifetime in The OpenAFS Foundation OpenAFS
MediumCVE-2025-66845: n/a
MediumNissan Confirms Impact From Red Hat Data Breach
MediumCVE-2025-14635: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thehappymonster Happy Addons for Elementor
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.