Browser Extensions Malware Affects Millions Of Users

A massive browser hijacking campaign has hit millions of users by exploiting trusted Chrome and Edge extensions, according to a new Report. 

Security researchers from Koi Security have uncovered a coordinated operation they have named RedDirection, in which 18 browser extensions, previously considered safe and even verified, were covertly updated to include harmful code.

These extensions offered functionality, received good reviews, touted verification badges, and some even enjoyed featured placement. But it transoires that after an extension has been available in the web store for a while, cyber criminals can insert malicious code through updates to the extension. 

According to the Report, the affected extensions, which include tools for color picking, video control, emoji input, and VPN access, initially functioned as expected.  Before turning malicious, one of the extensions had a Google verified badge, over 800 reviews, and a featured placement on the Chrome Web Store.

For many months the code remained clean, but after an update, they became malware infected without user interaction.  “By analysing the command and control infrastructure and tracking similar code patterns, we uncovered what we’re calling the RedDirection campaign, a sophisticated cross-platform network of eighteen malicious extensions spanning both Chrome and Edge stores, all sharing the same hijacking functionality... Combined, these eighteen extensions have infected over 2.3 million users across both browsers, creating one of the largest browser hijacking operations we’ve documented,” says the Report.

Some of the extensions named in the Report had previously held a Google verification badge, hundreds of positive reviews, and even featured placement in the Chrome Web Store. 

Their change into a malicious tool was not seen by users and has been undetected by platform security operations. Once updated, the extensions began to monitor browser activity in real-time. Every time a user opened a website, the extension captured the original URL and sent it, along with a unique identifier, to a remote command-and-control server. If instructed, the extension would then redirect the user to a phishing or malicious site, potentially stealing credentials or installing additional malware.

Importantly, the extensions retained full functionality, continuing to provide their advertised features. This dual behavior made detection by users unlikely and enabled attackers to exploit a large install base undisturbed.

Researchers highlighted that the malicious updates were distributed through the standard extension update process, with no phishing or user manipulation involved. As a result, even cautious users who installed only highly-rated, well-reviewed tools were exposed.

All 18 extensions have now been removed from the Chrome and Edge web stores, but some associated domains remain active. Koi Security has advised users to uninstall any of the listed extensions, clear browser data, run system-wide malware scans, and review all installed browser add-ons for suspicious activity.

Koi Security  |    I-HLS  |   MalwareBytes  |   Bleeping Computer  |   Cybernews  |  BrenTech 

Image: Alex Shuper

You Might Also Read: 

GitHub Exploited In Sophisticated Malware Campaign:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 





 

« Louis Vuitton Customer Data Hacked
The Dark Web - Its Origins & Current Use »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

National Cyber Security Centre (NCSC) - Switzerland

National Cyber Security Centre (NCSC) - Switzerland

The National Cyber Security Centre is Swizerland's competence centre for cybersecurity and the first contact point for businesses, public administrations, and the public for cyber issues.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

BHC Laboratory

BHC Laboratory

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

Defendify

Defendify

We built Defendify to help small businesses navigate the cybersecurity landscape with cybersecurity that is dead simple, affordable, and works around the clock.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

Camel Secure - ZeroRisk

Camel Secure - ZeroRisk

Camel Secure is a company specialized in the development of products for information security and technology risk management.

Antivirus Tales

Antivirus Tales

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

ClearSale (CLSA3)

ClearSale (CLSA3)

Clearsale’s innovative fraud solutions combine advanced technology with a passionate team of seasoned experts that understand every client’s unique needs.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.

Executive Operations (EXOP)

Executive Operations (EXOP)

Executive Operations provides 24/7 cyber security staffing - SOC support, compliance, IT help desk & app development. Save 60% with skilled English-speaking teams.