Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/CyberSecurity News/Malicious Chrome AI Extensions Attack 260K Attacking Users
CyberSecurity News

Malicious Chrome AI Extensions Attack 260K Attacking Users

A coordinated campaign is deploying malicious Chrome extensions. These extensions falsely impersonate popular AI tools, including ChatGPT, Claude, Gemini, and Grok. These fake “AI assistants” spy on...

Emy Elsamnoudy
Emy Elsamnoudy
February 13, 2026 3 Min Read
0 0

A coordinated campaign is deploying malicious Chrome extensions. These extensions falsely impersonate popular AI tools, including ChatGPT, Claude, Gemini, and Grok.

These fake “AI assistants” spy on users through injected, remote-controlled iframes, turning helpful browser add-ons into surveillance tools. More than 260,000 users have installed these extensions.

Security researchers identified at least 30 Chrome extensions promoted as AI tools for summarizing, chatting, translating, generating images, and boosting Gmail productivity.

Although they use different names and icons, they share the same codebase, permissions, and backend infrastructure, confirming a single organized operation.

Some extensions were even marked as “Featured” in the Chrome Web Store, increasing trust and downloads.

Here is the malicious extensions table in a clean format:

Extension ID Name Installs
nlhpidbjmmffhoogcennoiopekbiglbp AI Assistant 50,000
gcfianbpjcfkafpiadmheejkokcmdkjl Llama 147
fppbiomdkfbhgjjdmojlogeceejinadg Gemini AI Sidebar 80,000
djhjckkfgancelbmgcamjimgphaphjdl AI Sidebar 9,000
llojfncgbabajmdglnkbhmiebiinohek ChatGPT Sidebar 10,000
gghdfkafnhfpaooiolhncejnlgglhkhe AI Sidebar 50,000
cgmmcoandmabammnhfnjcakdeejbfimn Grok 261
phiphcloddhmndjbdedgfbglhpkjcffh Asking Chat Gpt 396
pgfibniplgcnccdnkhblpmmlfodijppg ChatGBT 1,000
nkgbfengofophpmonladgaldioelckbe Chat Bot GPT 426
gcdfailafdfjbailcdcbjmeginhncjkb Grok Chatbot 225
ebmmjmakencgmgoijdfnbailknaaiffh Chat With Gemini 760
baonbjckakcpgliaafcodddkoednpjgf XAI 138
fdlagfnfaheppaigholhoojabfaapnhb Google Gemini 7,000
gnaekhndaddbimfllbgmecjijbbfpabc Ask Gemini 1,000
hgnjolbjpjmhepcbjgeeallnamkjnfgi AI Letter Generator 129
lodlcpnbppgipaimgbjgniokjcnpiiad AI Message Generator 24
cmpmhhjahlioglkleiofbjodhhiejhei AI Translator 194
bilfflcophfehljhpnklmcelkoiffapb AI For Translation 91
cicjlpmjmimeoempffghfglndokjihhn AI Cover Letter Generator 27
ckneindgfbjnbbiggcmnjeofelhflhaj AI Image Generator Chat GPT 249
dbclhjpifdfkofnmjfpheiondafpkoed Ai Wallpaper Generator 289
ecikmpoikkcelnakpgaeplcjoickgacj Ai Picture Generator 813
kepibgehhljlecgaeihhnmibnmikbnga DeepSeek Download 275
ckicoadchmmndbakbokhapncehanaeni AI Email Writer 64
fnjinbdmidgjkpmlihcginjipjaoapol Email Generator AI 881
gohgeedemmaohocbaccllpkabadoogpl DeepSeek Chat 1,000
flnecpdpbhdblkpnegekobahlijbmfok ChatGPT Picture Generator 251
acaeafediijmccnjlokgcdiojiljfpbe ChatGPT Translate 30,000
kblengdlefjpjkekanpoidgoghdngdgl AI GPT 20,000
idhknpoceajhnjokpnbicildeoligdgh ChatGPT Translation 1,000
fpmkabpaklbhbhegegapfkenkmpipick Chat GPT for Gmail 1,000

When one extension is removed, attackers quickly upload a clone with a new name and ID, a tactic known as “extension spraying.”

Instead of running AI features locally, the extensions load a full-screen iframe from attacker-controlled domains such as tapnetic[.]pro.

IFrame Injection (Source: Layerx Security)
IFrame Injection (Source: Layerx Security)

This allows operators to change functionality remotely without updating the extension in the Chrome Web Store.

Once installed, the extensions can: Extract readable content from active tabs, including authenticated pages.

Capture voice input using the Web Speech API. Track installs and uninstalls using hidden telemetry. A Gmail-focused cluster of 15 extensions injects scripts directly into mail. google[.]com.

These scripts monitor page changes and repeatedly collect visible email content, including threads, drafts, and replies, and send it to attacker-controlled servers.

Tapnetic.pro subdomains – VirusTotal.com (Source: LayerxSecurity)
Tapnetic.pro subdomains – VirusTotal.com (Source: LayerxSecurity)

All identified extensions communicate with domains under tapnetic[.]pro and onlineapp[.]pro.

Each extension uses themed subdomains (such as chatgpt. tapnetic[.]pro or gemini. tapnetic[.]pro), but connects to the same backend system.

When one high-install extension was removed in February 2025, an identical replacement appeared within weeks using the same malicious architecture.

According to LayerxSecurity researcher, the campaign also relies on multiple Gmail accounts to manage and publish extensions.

Tactic Technique Code Technique Name
Resource Development LX2.003 (T1583) Acquire Infrastructure
Initial Access LX3.004 (T1189) Drive-by Compromise
Initial Access LX3.003 (T1199) Trusted Relationship
Execution LX4.003 Script Execution
Defense Evasion LX7.011 (T1036) Masquerading
Credential Access LX8.007 (T1557) Adversary-in-the-Middle
Collection LX10.012 Web Communication Data Collection
Collection LX10.005 Collect User’s Information
Command and Control LX11.004 Establish Network Connection
Command and Control LX11.005 Web Service-Based C2
Exfiltration LX12.001 Data Exfiltration

The operation uses brand impersonation, malicious browser extensions, and web-based command-and-control infrastructure.

By relying on remote iframes, attackers bypass install-time reviews and maintain full control after deployment.

Defenders should: Audit AI-branded Chrome extensions in their environments. Monitor for suspicious iframe injection and unusual Gmail DOM access.

Watch for outbound traffic to tapnetic[.]pro and related domains. Prioritize runtime monitoring over static extension reviews.

Organizations should treat AI-themed browser extensions with caution and enforce strict extension management policies.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackSecurity

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

OpenClaw 2026.2.12 Released With Fix for 40+ Security Issues

Next Post

CISA Warns: Microsoft Config Manager SQLi Configuration Injection

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us