News: 1764616452

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Stealthy browser extensions waited years before infecting 4.3M Chrome, Edge users with backdoors and spyware

(2025/12/01)


A seven-year malicious browser extension campaign infected 4.3 million Google Chrome and Microsoft Edge users with malware, including backdoors and spyware sending people's data to servers in China. And, according to Koi researchers, five of the extensions with more than 4 million installs are still live in the Edge marketplace.

The attackers, which Koi named ShadyPanda, played the long game: publishing legitimate extensions, accumulating thousands or sometimes millions of downloads over several years, and then pushing a malware-laden update that auto updates across the entire user base.

Because both marketplaces review extensions upon submission – it's not an ongoing process – these seemingly stellar productivity tools, some with Featured and Verified status alongside glowing user reviews and high install counts, were allowed to track people's behavior and steal sensitive info silently for years.

[1]

"No phishing. No social engineering. Just trusted extensions with quiet version bumps that turned productivity tools into surveillance platforms," the threat hunting team [2]said in a Monday blog.

[3]

[4]

Microsoft did not respond to The Register 's requests for comment. A Google spokesperson confirmed none of the extensions are available on the Chrome Web Store, and we are aware that Google screens every single update to extensions in the Chrome store, no matter how minor the change.

Koi tracked the ShadyPanda's activity in multiple phases, and says two campaigns are still active.

[5]

One of these campaigns included five extensions that infected 300,000 users with a remote-code-execution enabling backdoor. Three of the five were uploaded between 2018 and 2019 and achieved Featured and Verified status. One of those extensions, called Clean Master and published by Starlab Technology, has more than 200,000 installs.

In mid-2024, after being downloaded more than 300,000 times, ShadyPanda pushed a malicious update containing a backdoor across all five running on Chrome and Edge. While the extensions have since been removed from both marketplaces, "the infrastructure for full-scale attacks remains deployed on all infected browsers," the researchers wrote.

The malware allows complete browser surveillance, checking api.extensionplay[.]com for new instructions every hour, downloading arbitrary JavaScript, and executing it with full browser API access. It can also inject malicious content into any website, including HTTPS connections.

[6]

Clean Master then sends all of this stolen data - every URL visited, HTTP referrers showing navigation patterns, timestamps for activity profiling, persistent UUID4 identifiers, and complete browser fingerprints - to ShadyPanda-controlled servers.

Plus, the malware contains anti-analysis capabilities and switches to benign behavior if a researcher opens developer tools.

An additional five extensions from the same publisher launched on Edge around 2023 and now have more than four million combined installs. According to Koi, all five are still live on the Edge marketplace, and two of these install spyware on users' machines.

One of these five, WeTab, has three million intalls. It's a surveillance platform disguised as a productivity tool that snarfs all sorts of user data: every URL visited, search queries, mouse-click tracking, browser fingerprinting, page interaction data, and storage access – and then sends all of this, in real time, to 17 different domains (8 Baidu servers in China, 7 WeTab servers in China, and Google Analytics).

"The extension already has dangerous permissions including access to all URLs and cookies, users are downloading them right now," the researchers wrote. "ShadyPanda can push updates at any time, weaponizing 4 million browsers with the same RCE backdoor framework [from Clean Master] or something even worse."

[7]Compromised Amazon Q extension told AI to delete everything – and it shipped

[8]Your AI conversations are a secret new treasure trove for marketers

[9]Devs are writing VS Code extensions that blab secrets by the bucketload

[10]PostHog admits Shai-Hulud 2.0 was its biggest ever security bungle

Koi also traced ShadyPanda to a couple of earlier, now inactive, campaigns. One of these, which occurred during 2023, included 20 Chrome Web Store extensions and 125 on Microsoft Edge, all disguised as wallpaper or productivity apps.

This one worked by silently tracking and monetizing users' browsing data. When someone clicked on eBay, Amazon, or [11]Booking.com , the extensions injected affiliate tracking codes and Google Analytics trackers, which were then logged and used to sell people's website visits and search queries.

A second inactive campaign from early 2023 was also disguised as a new tab productivity tool called Infinity V+. It redirected every user's search to browser hijacking website [12]trovi.com , exfiltrated cookies, and logged users' keystrokes in the search box, sending all of this info to external servers.

According to the researchers, all of these ShadyPanda campaigns illustrate a problem in the way marketplaces manage extensions. "They don't watch what happens after approval," they wrote. ®

Get our [13]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aS4eCOcxF-Ib_QRZ5RaFFQAAAMk&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://www.koi.ai/blog/4-million-browsers-infected-inside-shadypanda-7-year-malware-campaign

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aS4eCOcxF-Ib_QRZ5RaFFQAAAMk&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aS4eCOcxF-Ib_QRZ5RaFFQAAAMk&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aS4eCOcxF-Ib_QRZ5RaFFQAAAMk&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aS4eCOcxF-Ib_QRZ5RaFFQAAAMk&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[7] https://www.theregister.com/2025/07/24/amazon_q_ai_prompt/

[8] https://www.theregister.com/2025/09/29/profound_browser_extension_privacy_concern/

[9] https://www.theregister.com/2025/10/15/vc_code_extension_leaks/

[10] https://www.theregister.com/2025/11/28/posthog_shaihulud/

[11] http://booking.com

[12] http://trovi.com

[13] https://whitepapers.theregister.com/



New and Improved with new China leak option

MachDiamond

Your data doesn't JUST go to M$ and Google, China gets a taste as well. Oh Joy!

The only machine I have with Chrome on it is a tiny PC running Cinnamon that I only use for one task. Whew.

Another 'China is bad' article

VoiceOfTruth

from Jessica Lyons.

Has Koi ever uncovered any spying by the USA? If not, I do not trust it to tell me what not to trust.

Re: Another 'China is bad' article

Alien Doctor 1.1

For once VoT I find myself agreeing with you. I keep hearing accusations against the Chinese, when 5 eyes, and the uarseofa strike me as being equally, if not more so, guilty.

Re: Another 'China is bad' article

Anonymous Coward

Good old 'Whatabout'ism'.

Re: Another 'China is bad' article

Jou (Mxyzptlk)

More like "none reported". And since we have actual proof of NSA/HS/Whatever hacking cisco hardware, the actual Anti-Huawei proof is still missing...

Re: Another 'China is bad' article

Anonymous Coward

> and then sends all of this, in real time, to 17 different domains (8 Baidu servers in China, 7 WeTab servers in China, and Google Analytics).

You can *send* data to anywhere, even to servers you don't own. Everyone does. Most Internet traffic does. If it is meaningless at the receiver it can be ignored, at worst return a "huh?" error.

Maybe the data "sent" to Baidu and WeTab is a blind, doing nothing more useful than filling up their "wtf is this doing?" logs whilst the real interested party is...

Blackjack

Something I have seen many times is legitimate browser extensions getting bought by bad actors, usually in Chrome, is one of the main reasons I don't use Chrome and web browsers based on it anymore.

Apparently that has become so common that they just started making their own extensions and just waiting for the right time.

Roland6

>Something I have seen many times is legitimate browser extensions getting bought by bad actors...

We've also seen similar with a few open source projects being takenover..

https://www.theregister.com/2024/04/01/xz_backdoor_open_source/

But wait, there's more!

ecofeco

Here's a thought. How many more sleepers are out there?

Oh joy.

trovi.com

Dan 55

If it's a browser hijacking site, why link to it?

Re: trovi.com

that one in the corner

It's an intelligence test.

Monoculture at its finest.

Jou (Mxyzptlk)

One engine, to be hacked all at once. Two things: more very different rendering engines, and the enforcement to support them. Without deliberately including code in webpages to be slower on competing browsers (hello youtube! Yes, I am talking about you in frist place!). A third thing would be less concentration on maketing-propaganda-fashion trends, more down to the base quality.

Re: Monoculture at its finest.

that one in the corner

And more pages opened in their own properly isolated environment, unless the user deliberately selects the option way down the right-click menu (as it is useful, sometimes, to have two tabs know you are logged into a site).

Will never be done, of course, because stopping your Facebook (etc etc etc) login following you around and "legitimately" watching your every move, converting it into saleable data, would probably be accused of being restraint of trade or some other bollocks ("deliberately stifling innovation", another good phrase). If only to tie browser makers up in the courts.

just waiting

Nate Amsden

For Google etc to use this as an excuse to remove extensions entirely in the name of "security". (Of course remember what they did to ublock origin. I've never used Chrome myself). For the typical user may make sense. Though I'll of course always prefer the extra control (and associated risk perhaps) with having a less locked down experience(android is the lesser of two evils in that regard compared to apple, though google is trying their best to close that gap). Feel the same way of course about anything that is forced to be encrypted/signed/etc.

Was it really a waiting game

DS999

Or was it someone buying out or taking over via force (hacking, blackmail etc.) a legit extension? Or maybe the developer's circumstances changed and he had big gambling debt or something like that?

That seems more likely than evildoers playing out a seven year long con.

"If there isn't a population problem, why is the government putting cancer in
the cigarettes?"
-- the elder Steptoe, c. 1970