Malicious Ownership Transfer of Chrome Extensions Enables Code Injection and Data Theft

Published:

spot_img

Malicious Ownership Transfer of Chrome Extensions Enables Code Injection and Data Theft

Two Google Chrome extensions have been compromised following an ownership transfer, allowing attackers to distribute malware, inject arbitrary code, and collect sensitive user data. The extensions, originally developed by an individual using the email “akshayanuonline@gmail.com,” are QuickLens and ShotBird.

Overview of Compromised Extensions

The affected extensions are:

  • QuickLens – Search Screen with Google Lens (ID: kdenlnncndfnhkognokgfpabgkgehodd) – 7,000 users
  • ShotBird – Scrolling Screenshots, Tweet Images & Editor (ID: gengfhhkjekmlejbhmmopegofnoifnjp) – 800 users

QuickLens has been removed from the Chrome Web Store, while ShotBird remains available. ShotBird was initially launched in November 2024, with its developer claiming that the extension was designed for creating professional visuals and that all processing occurred locally.

Recent research indicates that ShotBird received a “Featured” flag in January 2025 before being transferred to another developer, identified as “loraprice198865@gmail.com,” in early 2026. QuickLens was listed for sale on ExtensionHub shortly after its release, with ownership changing to “support@doodlebuggle.top” in February 2026.

Malicious Updates and Their Implications

On February 17, 2026, a malicious update was introduced to QuickLens, maintaining its original functionality while adding the capability to strip security headers from HTTP responses. This modification allowed malicious scripts to bypass Content Security Policy protections, enabling unauthorized requests to other domains.

The extension also included code to fingerprint users’ locations, detect their browser and operating system, and poll an external server every five minutes for JavaScript. This JavaScript was stored in the browser’s local storage and executed on page load by creating a hidden 1×1 GIF element, triggering the execution of the malicious code.

The malicious code does not appear in the extension’s source files. Instead, it relies on runtime delivery from a command-and-control (C2) server, as explained by Annex Security’s John Tuckner.

A similar analysis of ShotBird revealed that it used direct callbacks to deliver JavaScript code, displaying a fake Google Chrome update prompt. Clicking this prompt directed users to a page that opened the Windows Run dialog, executing a PowerShell command that downloaded an executable named “googleupdate.exe.”

Data Theft Mechanisms

The malware embedded in these extensions is capable of hooking into input fields, text areas, and select HTML elements to capture sensitive data, including credentials, PINs, and card details. It can also extract stored data from the Chrome browser, such as passwords and browsing history.

This two-stage abuse chain involves remote browser control through the extension and host-level execution via fake updates, significantly increasing the risk of credential theft and broader endpoint compromise.

Threat Actor Assessment

It is believed that the same threat actor is responsible for the compromise of both extensions, as evidenced by the identical C2 architecture and the use of ClickFix lures. This ownership transfer serves as a vector for infection, highlighting vulnerabilities in the extension supply chain.

The original developer has published several other extensions on the Chrome Web Store, all of which have received a Featured badge. The developer has also attempted to sell domains related to the rapidly growing AI ecosystem.

Broader Context of Malicious Extensions

The disclosure of these compromised extensions coincides with warnings from Microsoft regarding malicious Chromium-based browser extensions that masquerade as legitimate tools to harvest user data. The Microsoft Defender Security Research Team noted that such activities transform trusted productivity extensions into persistent data collection mechanisms, posing significant risks in corporate environments.

In recent weeks, additional malicious extensions have been identified, including one named lmToken Chromophore, which impersonates a legitimate tool while stealing cryptocurrency seed phrases through phishing redirects. Other flagged extensions have engaged in affiliate hijacking and data exfiltration, with some serving as remote access trojans.

Unit 42 researchers have also reported on the resurgence of previously removed extensions that scrape AI conversations from various chatbots. These extensions have been updated to benign versions, likely in response to public disclosures.

Recommendations for Users

Users who have installed any of the compromised extensions are advised to remove them immediately. It is essential to avoid installing unverified productivity extensions and to regularly audit browsers for any unknown extensions.

For further details, refer to the original reporting on this issue at thehackernews.com.

spot_img

Related articles

Recent articles

UAE Cyber Security Council’s Stark Warning: Over 60% of Financial Attacks Start with Stolen Credentials, Urges Danny Jenkins of ThreatLocker.

UAE Cyber Security Council's Stark Warning: Over 60% of Financial Attacks Start with Stolen Credentials, Urges Danny Jenkins of ThreatLocker Danny Jenkins, Co-Founder and CEO...

UK Cyber Agency Handles Four Major Incidents Weekly as Nation-State Attacks Surge

UK Cyber Agency Handles Four Major Incidents Weekly as Nation-State Attacks Surge Britain's cybersecurity landscape is facing unprecedented challenges, with the National Cyber Security Centre...

Publicis Sapient’s Srinivas Devulapalli Advances AI Integration as Essential Infrastructure for Enterprise Success

Publicis Sapient's Srinivas Devulapalli Advances AI Integration as Essential Infrastructure for Enterprise Success In the rapidly evolving landscape of technology, the integration of Artificial Intelligence...

FAO and Partners Accelerate Solutions for Formal Cross-Border Agritrade in Southern Africa

FAO and Partners Accelerate Solutions for Formal Cross-Border Agritrade in Southern Africa The Food and Agriculture Organization of the United Nations (FAO), in collaboration with...