Saturday, June 14, 2025
Advertisements

Over 40 Malicious Chrome Extensions Found Impersonating Popular Brands

by Charline

Cybersecurity experts have discovered a large-scale campaign involving more than 40 malicious Chrome browser extensions. These extensions pretend to be official tools from trusted companies and are designed to steal sensitive data from users.

The fake extensions are still available on the Google Chrome Web Store. They pose a serious threat to both individual users and corporate systems. Attackers have used advanced tricks to design these tools so they look like real products from well-known services, such as Fortinet’s FortiVPN, DeepSeek AI, Calendly, YouTube helper apps, and various crypto-related tools.

Advertisements

By copying the look and branding of these platforms, the extensions trick users into trusting them. This helps them avoid detection during installation and use.

Advertisements

Investigators Trace Back Campaign Origins

The discovery was made by researchers at LayerX. Their work expanded on earlier findings from the DomainTools Intelligence (DTI) team. While DTI first flagged suspicious domains linked to browser activity, LayerX mapped out the full network of dangerous extensions, including technical details such as extension IDs, publisher names, and behavioral patterns.

The analysis showed that these extensions are part of a coordinated campaign. The attackers not only copied well-known brands but also created domains that closely resemble real services. For example, they used addresses like calendlydaily[.]world and deepseek-ai[.]link to fool users.

Each fake extension included a professional-looking support email, often in the format support@domain-name, to appear more legitimate.

AI-Driven Design and Persistent Threats

The attackers used artificial intelligence to generate the content and layout for each Chrome Store page. This allowed them to create many similar-looking extensions quickly and efficiently.

Some of the tools were given obscure names like ccollcihnnpcbjcgcjfmabegkpbehnip (linked to FortiVPN) and jmpcodajbcpgkebjipbmjdoboehfiddd (related to DeepSeek AI Chat).

These extensions request high-level browser permissions. Once installed, they can access cookies, inject malicious scripts, and impersonate user sessions. This gives the attackers wide access to user data and online activity.

Even if the extensions are removed from the Chrome Web Store, they remain active on any system where they are already installed. Unless manually uninstalled, they continue to pose a security risk without the user’s knowledge.

Security experts urge users and IT departments to regularly review browser extensions and stay alert to suspicious activity. Google has not yet issued a statement on this campaign.
Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com