Security researchers at Socket have identified over 100 malicious Chrome extensions actively stealing user data, hijacking session tokens, and performing ad fraud through a coordinated malware-as-a-service campaign.
Key Points
- Researchers discovered 100+ malicious extensions in the Chrome Web Store linked to a Russian malware-as-a-service operation.
- The extensions steal Google OAuth2 Bearer tokens, Telegram session data, and personal account information.
- Attackers use a central backend hosted on Contabo VPS to execute commands and inject unauthorized HTML into browser interfaces.
- Affected software includes various categories such as Telegram clients, browser utilities, translation tools, and online games.
- Users are advised to check their installed extensions against the Socket report and immediately remove any identified malicious software.