ScamWatch

If you feel you're being scammed in United States: Contact the Federal Trade Commission (FTC) at 1-877-382-4357 or report online at reportfraud.ftc.gov

Malicious Browser Extensions: How Fake Chrome & Edge Add‑Ons Steal Data and What to Audit Now

Close-up of a smartphone with Chrome browser logo on screen placed on a red notebook.

Why this matters now

In the past two years researchers have repeatedly discovered large-scale campaigns that smuggled malicious code into official browser marketplaces and quietly turned otherwise legitimate add‑ons into spyware or data exfiltration tools. Recent investigations show hundreds of extensions and tens of millions of affected installs — attackers can harvest cookies, session tokens, clipboard contents and even inject backdoors that download new JavaScript on demand.

These campaigns are notable because many extensions behaved normally for months or years before maintainers (or attackers who bought the projects) pushed updates that began stealing data. That makes audits and runtime monitoring essential for both individual users and enterprise administrators.

How malicious extensions work (quick technical primer)

Malicious or compromised extensions commonly use one or more of the following techniques:

  • Remote script loading: The extension fetches UI and logic from an external server after install, allowing attackers to change behavior without a store update.
  • Broad host permissions: Requesting “read and change all your data on the websites you visit” enables scraping of page content, form data and cookies.
  • Cookie and token theft: Access to cookies or storage can let attackers hijack web sessions (email, cloud services, social apps).
  • Clipboard and form scraping: Extensions running on every page can read or replace clipboard contents (common route to steal one‑time codes and wallet addresses).
  • Background exfiltration: Persistent background workers periodically send harvested data to command‑and‑control endpoints; attackers then push new instructions or payloads.
  • Order/DOM attacks: Malicious extensions can alter page DOM or interact with other extensions to escalate privileges or hide activity.

Because many of these behaviors are triggered after install, static store review isn't enough — dynamic monitoring of network calls, service-worker activity and background scripts is necessary to detect active exfiltration.

Priority audit checklist — What to check right now (users & IT)

Use this prioritized list to find, assess and remove risky extensions. Start at the top and work down; each step includes a quick action you can complete in minutes.

For individual users (non‑technical)

  1. Open your extensions page: Visit chrome://extensions or edge://extensions. Disable or remove any extension you don’t recognize or no longer use.
  2. Check permissions: Click Details and look at site access. If an extension has "Access to all sites" or similar broad permissions but you only use it on one site, remove it.
  3. Review reviews & developer info: On the store page check developer contact, privacy policy and recent changelog; sudden changes in ownership or a vague privacy policy are red flags.
  4. Rotate credentials & sign out sessions: If you suspect compromise, sign out of critical web services, clear cookies for those sites, and rotate passwords or revoke active sessions from the account’s security page.
  5. Check clipboard and 2FA codes: If you paste or used a code while an extension was installed, assume it could be compromised; reset recovery codes where applicable.

For security teams / IT admins

  1. Inventory & blocklist: Produce a current inventory of allowed extensions and apply a blocklist for everything else via Group Policy, Google Admin console or Microsoft Intune. Prioritize removing extensions that request cookies, webRequest or “read and change all your data” permissions.
  2. Enable extension reporting & monitoring: Turn on extensions reporting/feedback policies (Edge/Intune or Chrome enterprise policies) so endpoints send telemetry about installed extensions and updates.
  3. Inspect runtime behavior: Use native DevTools and endpoint tooling to inspect network calls and background workers (see steps below) for unexpected remote script loads or outbound connections to suspicious hosts.
  4. Revoke compromised tokens & sessions: Revoke OAuth tokens, clear persisted sessions and force reauthentication for accounts accessed from affected devices.
  5. Use specialized scanners: Integrate extension‑scanning services (security vendors and open tools) into change control so new extensions are analyzed automatically before being approved for enterprise use.

Enterprise extension governance policies and reporting capabilities (Intune / Chrome enterprise) let you discover sideloaded or unmanaged extensions before they cause harm; implement or tighten those controls immediately.

Hands‑on inspection: quick commands and signs of malicious activity

Security teams and power users can do deeper checks using built‑in tools. These steps take longer but expose live malicious behavior:

  • Developer view: In chrome://extensions enable "Developer mode", click Inspect views for each extension and watch Console/Network for unexpected requests. Suspicious behavior includes frequent outbound requests to dynamic hostnames, encrypted payloads to unknown domains, or remote code downloads.
  • Network inspection: Use DevTools → Network while browsing to see if extension‑initiated requests appear. Check initiator column to confirm the request came from a chrome-extension:// origin. Long polling or repeated small uploads are common exfiltration patterns.
  • Check manifest & service worker: Review the extension’s manifest for high‑risk permissions (cookies, webRequest, hosts) and locate service worker/background script URIs — if they reference external endpoints, treat them as high risk.
  • Endpoint logs: Correlate browser telemetry with endpoint network logs (proxy, EDR) to identify connections to known malicious hosts or unexpected data transfer spikes after user installs an extension.

Tools and tutorials that walk through extension network inspection make these checks practical even without packet analyzers — inspect network initiators, record background worker requests and follow the call chain.

Remediation, reporting and longer‑term defenses

After removal or containment, follow these steps:

  • Contain: Isolate affected devices, remove the extension and any related packages, and block outbound domains used by the extension at the network layer.
  • Remediate accounts: Invalidate sessions, rotate credentials, and remove stored credentials from password managers if you suspect theft. Encourage affected users to use passkeys or hardware MFA where possible.
  • Report: Report malicious extensions to the Chrome Web Store and the Microsoft Edge Add‑ons portal, and open an incident with your security vendor or CERT if you see broad impact.
  • Harden policy: Move to an allowlist model where practical, enable extension reporting and automated scanning, and require security reviews for any productivity extensions before approving them for enterprise use.

Large campaigns in 2024–2026 show that marketplace presence is not a guarantee of safety — attackers use supply‑chain techniques and remote script loading to weaponize extensions over time. That makes continuous monitoring, strict enterprise policies and rapid incident response the most reliable defenses.

Need a checklist for your IT team? Begin with (1) an inventory of installed extensions, (2) a host/permission risk review, (3) blocklisting of unknown extensions, (4) telemetry enablement (Intune/Chrome policies), and (5) user communication to remove personal installs. Implement these now and reassess quarterly.