Posts: 15,854
Threads: 10,151
Thanks Received: 9,306 in 7,452 posts
Thanks Given: 10,217
Joined: 12 September 18
7 hours ago
Quote:More than 260,000 Chrome users unknowingly installed browser extensions labeled as a helpful AI assistant. According to researchers at LayerX, the coordinated campaign involved over 30 fake Chrome extensions posing as services similar to ChatGPT and Claude.
We have seen a fair share of malicious Chrome extensions since Google released the initial version of its browser. From fake VPN extensions and outright malicious extensions to sophisticated session replay malware. While marketed as AI productivity tools, new add-ons would deploy spyware that steals browsing and Gmail data.
How Fake AI Extensions on the Chrome Web Store Worked?
Researchers discovered that the malicious AI extensions shared nearly identical code, permissions, and backend infrastructure. Instead of appearing as separate tools with different names and branding, they relied on the same underlying structure.
Security researcher Natalie Zargarov explained that the campaign exploited users’ trust in AI interfaces:
Quote:“By injecting iframes that mimic trusted AI interfaces, they’ve created a nearly invisible man-in-the-middle attack that intercepts everything from API keys to personal data before it ever reaches the legitimate service.”
The attack was especially effective because it integrated into normal AI interactions, where users are already getting used to sharing detailed information.
The “AiFrame” extension Architecture Explained
At the core of the operation was what researchers call an “AiFrame” extension architecture.
Instead of embedding full functionality inside the extension code reviewed by Google during installation, the extensions:- Loaded a full-screen iframe from remote domains (e.g., subdomains of tapnetic[.]pro)
- Overlaid the current webpage
- Acted as a fake AI interface
- Pulled instructions dynamically from backend servers
This setup allowed attackers to change behavior remotely without pushing an updated version to the Chrome Web Store. In other words, what users installed wasn’t necessarily what was running later.
Continue Reading...