Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Teams Vulnerability Enables Spoofing Attacks
May 13, 2026
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables
May 12, 2026
Home/CyberSecurity News/Hackers Steal User Data Using 108 Mal Chrome Extensions
CyberSecurity News

Hackers Steal User Data Using 108 Mal Chrome Extensions

A widespread cyber espionage campaign is actively leveraging 108 malicious Google Chrome extensions. According to a recent report from Socket, these extensions are explicitly designed to steal...

David kimber
David kimber
April 14, 2026 3 Min Read
7 0

A widespread cyber espionage campaign is actively leveraging 108 malicious Google Chrome extensions. According to a recent report from Socket, these extensions are explicitly designed to steal sensitive user data and hijack active web sessions.

The attackers manage this extensive operation through a highly organized, shared Command and Control (C2) infrastructure.

This centralized setup makes it significantly easier for threat actors to scale their data theft efforts across thousands of potential victims without needing to build new backends for every tool.

Rogue Extensions Funnel User Data

Often disguised as legitimate productivity tools, utility apps, or browser enhancements, these rogue extensions trick users into downloading them.

Chrome Extensions Steal User Data
Socket’s AI scanner flagged extension obifanppcpchlehkjipahhphbcbjekfa as malware, citing session exfiltration and account takeover behavior (source: Socket)

Once installed, their true malicious intent is activated, hidden within the background scripts. The malware silently monitors web browsing activity and harvests critical personal and corporate information.

Because the attackers rely on a shared C2 network, all 108 extensions funnel their stolen data back to the same group of malicious servers.

This shared backend allows the hackers to efficiently update their malicious payloads, issue new commands, and process massive amounts of stolen information simultaneously.

The primary objective of this coordinated campaign is data exfiltration and session theft. The extensions are programmed to copy browser cookies and active session tokens silently, and to save login credentials.

Stealing session tokens is a particularly dangerous and highly effective tactic because it allows hackers to bypass multi-factor authentication (MFA) completely.

Armed with a valid session token, an attacker can directly access secure accounts, including corporate email, financial dashboards, and internal company portals, without ever needing the user’s actual password.

Chrome Extensions Steal User Data
Chrome Web Store listings reveal three campaign-linked developer URLs: top[.]rodeo, webuk[.]tech, and interalt[.]net.(source : socket )

This presents a critical risk to enterprise environments, where a single compromised browser can lead to a devastating network breach.

To evade detection, the hackers behind these extensions utilize various stealth techniques. The malicious code is often heavily obfuscated to hide its true purpose from automated security scanners.

In many cases, extensions delay the execution of their data-stealing functions to bypass initial security checks during installation.

Furthermore, the shared C2 infrastructure frequently changes its domain names and IP addresses, complicating security teams’ efforts to block malicious network traffic permanently.

Chrome Extensions Steal User Data
Shodan shows 144[.]126[.]135[.]238 hosted on Contabo with nine open ports, including Strapi (1337) and PostgreSQL (5432) (source:Socket)

Mitigating this browser-based threat requires proactive security management.

According to Socket research, organizations should immediately audit all Chrome extensions installed on corporate devices and enforce strict enterprise policies that only allow pre-approved, vetted extensions.

Individual users must regularly review their browser add-ons and delete any suspicious or unused ones.

Additionally, network administrators should actively monitor outbound network traffic for connections to unrecognized servers and deploy endpoint protection solutions that detect abnormal data exfiltration from web browsers.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachHackerMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Researcher Reverse Engineers 0-Day Disabling CrowdStrike E

Next Post

Booking.com Data Breach Confirmed: Customer Info Confirms Hackers

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ivanti Patches Critical Vulnerabilities in Secure Access &
May 12, 2026
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us