Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users
Cybersecurity researchers have discovered two new malicious extensions on the Chrome Web Store that are designed to exfiltrate OpenAI ChatGPT and DeepSeek conversations alongside browsing data to servers under the attackers' control. The names of the extensions, which collectively have over 900,000 users, are below - Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI (ID:
AI Analysis
Technical Summary
Cybersecurity researchers identified two malicious Chrome extensions—"Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI" and "AI Sidebar with Deepseek, ChatGPT, Claude, and more"—with a combined user base exceeding 900,000. These extensions stealthily exfiltrate user conversations from AI chatbots ChatGPT and DeepSeek, as well as browsing data including open tab URLs, to attacker-controlled command and control (C2) servers approximately every 30 minutes. The extensions request user consent under the guise of collecting anonymous analytics but instead scrape DOM elements to capture chat messages and store them locally before transmission to domains such as chatsaigpt[.]com and deepaichats[.]com. The attackers leverage AI-powered web development platforms to host infrastructure components and obfuscate malicious activity. This tactic, termed 'Prompt Poaching' by Secure Annex, enables attackers to harvest sensitive conversational data that may include intellectual property, customer information, and confidential business details. The malicious extensions impersonate a legitimate extension with a large user base to increase trust and downloads. Additionally, legitimate extensions like Similarweb and Stayfocusd have been found to collect AI prompt data explicitly, raising privacy concerns. The threat exploits the trust model of browser extensions and user consent mechanisms, with no authentication or user interaction beyond initial permission granting required. Although no active exploits beyond data exfiltration are reported, the potential for corporate espionage, identity theft, and targeted phishing is significant. The extensions remain available on the Chrome Web Store, highlighting ongoing risks. This threat underscores the emerging trend of malicious and privacy-invasive browser extensions targeting AI chatbot data, necessitating heightened scrutiny and mitigation efforts.
Potential Impact
European organizations are at risk of sensitive data leakage through employee use of these malicious extensions. The exfiltrated data includes AI chatbot conversations that may contain proprietary business information, customer data, and internal communications, as well as browsing activity revealing corporate URLs and search queries. Such data theft can facilitate corporate espionage, enabling competitors or nation-state actors to gain strategic advantages. Identity theft and targeted phishing campaigns can also arise from harvested personal and organizational information. The widespread installation base increases the likelihood of exposure across various sectors, including finance, technology, healthcare, and government. The threat undermines trust in browser extensions and AI tools, potentially impacting digital transformation initiatives. Given the extensions' persistence on official stores, organizations may face challenges in fully eradicating the risk without proactive measures. The impact extends beyond confidentiality to potential reputational damage and regulatory compliance issues under GDPR if personal data is compromised. Overall, the threat poses a moderate to high risk to European entities relying on AI chatbots and browser extensions for business operations.
Mitigation Recommendations
Organizations should implement strict browser extension policies, restricting installation to vetted and approved extensions only. Deploy enterprise browser management tools to monitor and control extension usage and permissions. Conduct regular audits of installed extensions on employee devices to identify and remove suspicious or unauthorized add-ons. Educate employees about the risks of installing extensions from unverified sources, emphasizing the dangers of granting broad permissions. Employ endpoint detection and response (EDR) solutions capable of detecting unusual network traffic patterns indicative of data exfiltration. Use network security controls to block or monitor traffic to known malicious domains such as chatsaigpt[.]com and deepaichats[.]com. Encourage the use of privacy-focused browsers or profiles that isolate work-related AI chatbot usage from personal browsing. Collaborate with legal and compliance teams to assess potential GDPR implications and prepare incident response plans for data breaches involving AI chatbot data. Stay informed about updates from browser vendors regarding extension policies and removals. Finally, consider deploying Data Loss Prevention (DLP) solutions tailored to detect sensitive data leaving endpoints via browser extensions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users
Description
Cybersecurity researchers have discovered two new malicious extensions on the Chrome Web Store that are designed to exfiltrate OpenAI ChatGPT and DeepSeek conversations alongside browsing data to servers under the attackers' control. The names of the extensions, which collectively have over 900,000 users, are below - Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI (ID:
AI-Powered Analysis
Technical Analysis
Cybersecurity researchers identified two malicious Chrome extensions—"Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI" and "AI Sidebar with Deepseek, ChatGPT, Claude, and more"—with a combined user base exceeding 900,000. These extensions stealthily exfiltrate user conversations from AI chatbots ChatGPT and DeepSeek, as well as browsing data including open tab URLs, to attacker-controlled command and control (C2) servers approximately every 30 minutes. The extensions request user consent under the guise of collecting anonymous analytics but instead scrape DOM elements to capture chat messages and store them locally before transmission to domains such as chatsaigpt[.]com and deepaichats[.]com. The attackers leverage AI-powered web development platforms to host infrastructure components and obfuscate malicious activity. This tactic, termed 'Prompt Poaching' by Secure Annex, enables attackers to harvest sensitive conversational data that may include intellectual property, customer information, and confidential business details. The malicious extensions impersonate a legitimate extension with a large user base to increase trust and downloads. Additionally, legitimate extensions like Similarweb and Stayfocusd have been found to collect AI prompt data explicitly, raising privacy concerns. The threat exploits the trust model of browser extensions and user consent mechanisms, with no authentication or user interaction beyond initial permission granting required. Although no active exploits beyond data exfiltration are reported, the potential for corporate espionage, identity theft, and targeted phishing is significant. The extensions remain available on the Chrome Web Store, highlighting ongoing risks. This threat underscores the emerging trend of malicious and privacy-invasive browser extensions targeting AI chatbot data, necessitating heightened scrutiny and mitigation efforts.
Potential Impact
European organizations are at risk of sensitive data leakage through employee use of these malicious extensions. The exfiltrated data includes AI chatbot conversations that may contain proprietary business information, customer data, and internal communications, as well as browsing activity revealing corporate URLs and search queries. Such data theft can facilitate corporate espionage, enabling competitors or nation-state actors to gain strategic advantages. Identity theft and targeted phishing campaigns can also arise from harvested personal and organizational information. The widespread installation base increases the likelihood of exposure across various sectors, including finance, technology, healthcare, and government. The threat undermines trust in browser extensions and AI tools, potentially impacting digital transformation initiatives. Given the extensions' persistence on official stores, organizations may face challenges in fully eradicating the risk without proactive measures. The impact extends beyond confidentiality to potential reputational damage and regulatory compliance issues under GDPR if personal data is compromised. Overall, the threat poses a moderate to high risk to European entities relying on AI chatbots and browser extensions for business operations.
Mitigation Recommendations
Organizations should implement strict browser extension policies, restricting installation to vetted and approved extensions only. Deploy enterprise browser management tools to monitor and control extension usage and permissions. Conduct regular audits of installed extensions on employee devices to identify and remove suspicious or unauthorized add-ons. Educate employees about the risks of installing extensions from unverified sources, emphasizing the dangers of granting broad permissions. Employ endpoint detection and response (EDR) solutions capable of detecting unusual network traffic patterns indicative of data exfiltration. Use network security controls to block or monitor traffic to known malicious domains such as chatsaigpt[.]com and deepaichats[.]com. Encourage the use of privacy-focused browsers or profiles that isolate work-related AI chatbot usage from personal browsing. Collaborate with legal and compliance teams to assess potential GDPR implications and prepare incident response plans for data breaches involving AI chatbot data. Stay informed about updates from browser vendors regarding extension policies and removals. Finally, consider deploying Data Loss Prevention (DLP) solutions tailored to detect sensitive data leaving endpoints via browser extensions.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/two-chrome-extensions-caught-stealing.html","fetched":true,"fetchedAt":"2026-01-06T17:58:39.108Z","wordCount":1474}
Threat ID: 695d4d51a7c70f178f8acfc2
Added to database: 1/6/2026, 5:58:41 PM
Last enriched: 1/6/2026, 5:58:56 PM
Last updated: 1/8/2026, 4:22:10 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12776: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Commvault WebConsole
LowVulnerability in Totolink Range Extender Allows Device Takeover
LowInside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns
MediumWebinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
LowCVE-2025-12958: CWE-285 Improper Authorization in rankology Rankology SEO and Analytics Tool
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.