108 Malicious Chrome Extensions Target 20K Users

Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-

Cybersecurity

A coordinated cybersecurity threat has emerged targeting Chrome users worldwide. Researchers uncovered a network of 108 malicious browser extensions operating under unified command-and-control infrastructure, compromising sensitive data from approximately 20,000 affected users.

The discovered extensions function as data harvesting tools with capabilities extending beyond simple information theft. Once installed, these extensions inject unwanted advertisements and arbitrary JavaScript code into every webpage users visit, fundamentally compromising browser security and user experience. The unified infrastructure controlling these extensions indicates a sophisticated, organized operation rather than isolated malware incidents.

The primary targets include credentials and authentication data from Google and Telegram, two services billions rely on daily for communication and account management. By capturing this sensitive information, attackers gain potential access to email accounts, cloud storage, messaging histories, and associated personal data—creating cascading security risks across users' digital ecosystems.

The extensions were distributed through official app channels, underscoring how attackers continue exploiting platform trust mechanisms. This discovery highlights a persistent vulnerability in browser extension marketplaces where malicious actors successfully bypass initial security screening processes. The sheer number of extensions—108 operating in concert—suggests sophisticated obfuscation and distribution techniques designed to evade automated detection systems.

For affected users, immediate action is critical. Security experts recommend auditing installed extensions, removing unfamiliar or suspicious add-ons, and changing passwords for compromised services, particularly Google and Telegram accounts. Users should enable two-factor authentication across all critical accounts to prevent unauthorized access even if credentials were stolen.

The discovery underscores broader concerns about extension security across major browsers. While Chrome's Web Store implements review processes, determined threat actors continue finding methods to distribute malware at scale. This incident reinforces the importance of regular security audits, minimalist extension installation practices, and maintaining skepticism toward unfamiliar add-ons regardless of apparent legitimacy or user review ratings. Ongoing collaboration between security researchers and platform providers remains essential for protecting users from increasingly sophisticated threats.

Editorial note: This article represents original analysis and commentary by the TechDailyPulse editorial team.