Two Chrome Extensions Secretly Steal Credentials from 170+ Websites

Published:

spot_img

Malicious Google Chrome Extensions: A Deep Dive into Cybersecurity Threats

Cybersecurity researchers have recently unveiled a concerning threat within the Google Chrome ecosystem—two malicious extensions that, under the guise of a legitimate tool, intercept user traffic and steal personal information. These extensions, both named “Phantom Shuttle” and developed by the same entity, present a significant risk to unsuspecting users who believe they are enhancing their online experience.

Overview of the Extensions

Details on Phantom Shuttle

The two variations of Phantom Shuttle are currently available for download, each showcasing different user bases:

  • Phantom Shuttle (ID: fbfldogmkadejddihifklefknmikncaj): Approximately 2,000 users; published on November 26, 2017.
  • Phantom Shuttle (ID: ocpcmfmiidofonkbodpdhgddhlcmcofd): Around 180 users; published on April 27, 2023.

These extensions are marketed as a “multi-location network speed test plug-in,” ostensibly tailored for developers and international traders. However, beneath this façade lies a malicious intent.

Subscription Model Deception

According to Socket security researcher Kush Pandya, users pay a subscription fee ranging from ¥9.9 to ¥95.9 CNY (about $1.40 to $13.50 USD), believing they are securing a legitimate Virtual Private Network (VPN) service. In reality, both extensions execute harmful actions, including traffic interception and credential theft.

Malicious Operations

Traffic Interception Techniques

After payment, users achieve “VIP status,” which automatically activates a so-called “smarty” proxy mode. This design routes traffic through over 170 targeted domains through a command-and-control (C2) infrastructure. Notably, the extensions cloak their true nature by performing actual latency tests and displaying connection statuses while stealthily capturing user credentials.

This operation hinges on two modified JavaScript libraries integrated into the extensions, specifically jquery-1.12.2.min.js and scripts.js. The malicious code effectively injects hardcoded proxy credentials (topfany / 963852wei) into every HTTP authentication prompt across all visited websites. Understanding this process exposes how these extensions disguise themselves while compromising user safety.

Mechanism of Credential Theft

Pandya explained that the extensions employ a listener via chrome.webRequest.onAuthRequired. This listener responds instantly whenever a site prompts for HTTP authentication, ensuring users remain unaware of the ongoing threat. The process is smooth and automatic—there’s no need for user interaction.

Once the proxy server authenticates, these extensions modify Chrome’s proxy settings through a Proxy Auto-Configuration (PAC) script, triggering one of three operational modes:

  • Close: Disables the proxy feature.
  • Always: Routes all web traffic through the proxy.
  • Smarty: Routes a pre-determined list of over 170 chosen high-value domains through the proxy.

The malicious list includes reputable developer platforms like GitHub, social media sites like Facebook, and sensitive cloud services. Interestingly, the inclusion of adult content websites may suggest ulterior motives, such as potential blackmail schemes.

Continuous Data Exfiltration

The operation remains persistent, maintaining a heartbeat communication with its C2 server at phantomshuttle[.]space, which is still operational. This heartbeat allows attackers a “man-in-the-middle” (MitM) position, where they can intercept, manipulate, and even inject data into user traffic.

What’s more alarming is that this heartbeat also transmits sensitive user information—including email addresses, plaintext passwords, and version numbers—every five minutes to an external server. This setup facilitates continuous theft and surveillance of user sessions.

The Broader Impact

As these extensions siphon off critical user data, they also target various sensitive information, including passwords and API keys. Moreover, any stolen developer secrets could potentially lead to broader supply chain attacks—an escalating danger in today’s digital landscape.

While the identity of the orchestrators remains unclear, indicators suggest a China-based operation, given the use of Chinese language in the extension’s description and the payment integration through Alipay and WeChat Pay, along with the hosting of the C2 domain on Alibaba Cloud.

User Precautions and Organizational Response

The subscription model effectively retains victims, fostering a facade of credibility. As users unknowingly enable their traffic to be compromised, cybersecurity teams must remain vigilant. Those who have installed these extensions are strongly urged to remove them immediately.

For organizations, adopting extension allowlisting, monitoring for suspicious proxy activities, and maintaining rigorous network surveillance are essential steps to mitigate risks associated with these kinds of threats. The findings emphasize a growing underground risk linked to browser extensions, reiterating the need for proactive cybersecurity measures.

spot_img

Related articles

Recent articles

SEF 2026: Ignite Your Journey with Masterclasses in Business, Tech, and Creative Growth

Sharjah Entrepreneurship Festival 2026: Empowering Founders with Masterclasses The Sharjah Entrepreneurship Festival (SEF 2026) is gearing up to support entrepreneurs at every stage of their...

Massive Data Breach at Shinhan Card Impacts 192,000 Merchants in South Korea

markdown ## Shinhan Card Data Breach: An Overview of the Incident On Tuesday, South Korea's Shinhan Card confirmed a significant data breach that has impacted approximately...

Cyberattack Disrupts French Postal and Banking Services Just Before Christmas

Understanding the La Poste Cyberattack: Implications and Context Introduction to the Incident In December 2025, La Poste, France's national postal service, experienced a significant cyberattack that...

New Android Malware Steals SMS and Bank Codes with Live Commands

A Campaign That Blended Into Everyday Digital Life In the autumn of 2025, the cybersecurity landscape in Central Asia underwent a shocking transformation as researchers...