Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/CyberSecurity News/TikTok Video Downloader Extensions Compromise 130k
CyberSecurity News

TikTok Video Downloader Extensions Compromise 130k

A new malware campaign, dubbed “StealTok,” is leveraging at least 12 interrelated browser extensions. These extensions masquerade as TikTok video downloaders, secretly tracking user...

Marcus Rodriguez
Marcus Rodriguez
April 21, 2026 3 Min Read
11 0

A new malware campaign, dubbed “StealTok,” is leveraging at least 12 interrelated browser extensions. These extensions masquerade as TikTok video downloaders, secretly tracking user activity and harvesting sensitive data.

The campaign uncovered by LayerX security has affected over 130,000 users worldwide, with approximately 12,500 installations still active across the Google Chrome and Microsoft Edge marketplaces.

The attackers use a highly organized approach, releasing multiple clones or slightly rebranded versions of the same core extension.

This creates a resilient operation: when one extension is identified and removed, threat actors upload a new clone to replace it.

To gain user trust, the malicious extensions initially function perfectly as advertised, allowing users to download TikTok videos without watermarks.

Many of these tools even earned a “Featured” badge in official extension stores, significantly reducing user suspicion and boosting download numbers.

What makes this campaign particularly dangerous is its use of delayed capability injection.

Malicious Extensions on Google Chrome and Microsoft Edge marketplaces(source : LayerX security)
Malicious Extensions on Google Chrome and Microsoft Edge marketplaces (Source: LayerX security)

For the first 6 to 12 months, the extensions behave legitimately, building a solid reputation and passing initial security reviews.

Once enough time has passed, the extensions connect to external command-and-control servers to download dynamic remote configurations.

This hidden mechanism allows the attackers to fundamentally alter the extension’s behavior, turning a harmless video downloader into a powerful spyware tool without alerting the user or the marketplace.

After the malicious features are activated, the extensions begin quietly gathering extensive telemetry on the user.

They monitor usage patterns, track downloaded content, and collect high-entropy data, such as time zone, language settings, and even device battery status.

By combining these specific data points, the attackers can create a highly accurate “fingerprint” of the user’s device, enabling them to track the user across different web sessions and services.

To hide this data theft, the extensions send the information to deceptive domains with misspelled names, like “trafficreqort.com,” to avoid casual detection.

This campaign highlights a critical weakness in current browser security: relying solely on installation-time validation is no longer enough.

Because these extensions use remote configurations to evolve, the real risk happens long after the initial download.

Security experts recommend that organizations adopt continuous, behavior-based monitoring to detect suspicious network activity, hidden data collection, and unexpected permission usage in real-time.

Active and Removed Threats

LayerX security researchers identified several specific extensions involved in the StealTok campaign.

On Google Chrome, active threats include “TikTok Downloader – Save Videos, No Watermark” with 3,000 installs, “TikTok Video Downloader – Bulk Save” with 1,000 installs, and “Tiktok Downloader” with 353 installs.

On Microsoft Edge, active malicious extensions include “Mass Tiktok Video Downloader” with 77 installs and another version named “TikTok Downloader – Save Videos, No Watermark” with 47 installs.

Several highly popular versions of this malware have already been removed from Google Chrome, including “TikTok Video Keeper,” which had reached 60,000 installs, and “Video Downloader for Tiktok,” which had 20,000 installs.

If you have any of these extensions installed, security experts advise removing them immediately and changing passwords for sensitive accounts.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Claude, Gemini, Copilot Vulnerable to Prompt Injection

Next Post

Hackers Could Weaponize GGUF Models to Achieve RCE on SGLang

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us