Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users

0
Low
Vulnerabilityweb
Published: Tue Jan 06 2026 (01/06/2026, 17:21:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have discovered two new malicious extensions on the Chrome Web Store that are designed to exfiltrate OpenAI ChatGPT and DeepSeek conversations alongside browsing data to servers under the attackers' control. The names of the extensions, which collectively have over 900,000 users, are below - Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI (ID:

AI-Powered Analysis

AILast updated: 01/06/2026, 17:58:56 UTC

Technical Analysis

Cybersecurity researchers identified two malicious Chrome extensions—"Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI" and "AI Sidebar with Deepseek, ChatGPT, Claude, and more"—with a combined user base exceeding 900,000. These extensions stealthily exfiltrate user conversations from AI chatbots ChatGPT and DeepSeek, as well as browsing data including open tab URLs, to attacker-controlled command and control (C2) servers approximately every 30 minutes. The extensions request user consent under the guise of collecting anonymous analytics but instead scrape DOM elements to capture chat messages and store them locally before transmission to domains such as chatsaigpt[.]com and deepaichats[.]com. The attackers leverage AI-powered web development platforms to host infrastructure components and obfuscate malicious activity. This tactic, termed 'Prompt Poaching' by Secure Annex, enables attackers to harvest sensitive conversational data that may include intellectual property, customer information, and confidential business details. The malicious extensions impersonate a legitimate extension with a large user base to increase trust and downloads. Additionally, legitimate extensions like Similarweb and Stayfocusd have been found to collect AI prompt data explicitly, raising privacy concerns. The threat exploits the trust model of browser extensions and user consent mechanisms, with no authentication or user interaction beyond initial permission granting required. Although no active exploits beyond data exfiltration are reported, the potential for corporate espionage, identity theft, and targeted phishing is significant. The extensions remain available on the Chrome Web Store, highlighting ongoing risks. This threat underscores the emerging trend of malicious and privacy-invasive browser extensions targeting AI chatbot data, necessitating heightened scrutiny and mitigation efforts.

Potential Impact

European organizations are at risk of sensitive data leakage through employee use of these malicious extensions. The exfiltrated data includes AI chatbot conversations that may contain proprietary business information, customer data, and internal communications, as well as browsing activity revealing corporate URLs and search queries. Such data theft can facilitate corporate espionage, enabling competitors or nation-state actors to gain strategic advantages. Identity theft and targeted phishing campaigns can also arise from harvested personal and organizational information. The widespread installation base increases the likelihood of exposure across various sectors, including finance, technology, healthcare, and government. The threat undermines trust in browser extensions and AI tools, potentially impacting digital transformation initiatives. Given the extensions' persistence on official stores, organizations may face challenges in fully eradicating the risk without proactive measures. The impact extends beyond confidentiality to potential reputational damage and regulatory compliance issues under GDPR if personal data is compromised. Overall, the threat poses a moderate to high risk to European entities relying on AI chatbots and browser extensions for business operations.

Mitigation Recommendations

Organizations should implement strict browser extension policies, restricting installation to vetted and approved extensions only. Deploy enterprise browser management tools to monitor and control extension usage and permissions. Conduct regular audits of installed extensions on employee devices to identify and remove suspicious or unauthorized add-ons. Educate employees about the risks of installing extensions from unverified sources, emphasizing the dangers of granting broad permissions. Employ endpoint detection and response (EDR) solutions capable of detecting unusual network traffic patterns indicative of data exfiltration. Use network security controls to block or monitor traffic to known malicious domains such as chatsaigpt[.]com and deepaichats[.]com. Encourage the use of privacy-focused browsers or profiles that isolate work-related AI chatbot usage from personal browsing. Collaborate with legal and compliance teams to assess potential GDPR implications and prepare incident response plans for data breaches involving AI chatbot data. Stay informed about updates from browser vendors regarding extension policies and removals. Finally, consider deploying Data Loss Prevention (DLP) solutions tailored to detect sensitive data leaving endpoints via browser extensions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/01/two-chrome-extensions-caught-stealing.html","fetched":true,"fetchedAt":"2026-01-06T17:58:39.108Z","wordCount":1474}

Threat ID: 695d4d51a7c70f178f8acfc2

Added to database: 1/6/2026, 5:58:41 PM

Last enriched: 1/6/2026, 5:58:56 PM

Last updated: 1/8/2026, 4:22:10 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats