Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Darkhub Hacking-for-Hire Portal: Crypto Advertises Fraud
May 7, 2026
CloudZ RAT Steals SMS OTPs via Microsoft Phone Abuses Link
May 6, 2026
QLNX Credential Theft Targets Developers for Supply Chain Comprom
May 6, 2026
Home/Threats/Malicious Chrome GhostPoster Extensions Steal User Data
Threats

Malicious Chrome GhostPoster Extensions Steal User Data

Seventeen malicious browser extensions, deployed by cybercriminals across Chrome, Firefox, and Edge platforms, have collectively seen over 840,000 downloads, compromising user security for years. The...

Marcus Rodriguez
Marcus Rodriguez
January 19, 2026 3 Min Read
3 0

Seventeen malicious browser extensions, deployed by cybercriminals across Chrome, Firefox, and Edge platforms, have collectively seen over 840,000 downloads, compromising user security for years.

The GhostPoster campaign, which emerged as early as 2020, used deceptive extension names like “Google Translate in Right Click,” “Youtube Download,” and “Ads Block Ultimate” to appear legitimate while quietly stealing sensitive user information.

These extensions successfully bypassed security reviews from major browser stores, remaining active for up to five years before being discovered.

The sheer scale of installations demonstrates the effectiveness of this attack and the difficulty users face distinguishing trustworthy extensions from dangerous imposters.

GhostPoster Upload to Browser Extension Stores (Source - LayerX Security)
GhostPoster Upload to Browser Extension Stores (Source – LayerX Security)

The attack exploits a fundamental weakness in browser security: users trust extensions that appear in official stores.

The malicious extensions used steganography to hide malicious code inside PNG image files, a technique that conceals data in plain sight.

Once installed, the extensions extract the hidden payload and establish communication with attacker-controlled servers to download additional malicious scripts.

The malware then performs several harmful actions including hijacking affiliate links for financial gain, injecting scripts to track user behavior, manipulating HTTP headers to disable security protections, and stealing credentials and personal data.

Firefox Extension Available for Download in Store (Source - LayerX Security)
Firefox Extension Available for Download in Store (Source – LayerX Security)

The sophistication of these tactics shows this is not opportunistic malware but rather a well-planned operation targeting financial gain and sustained access to user devices.

LayerX Security analysts identified the full scope of the campaign after Koi Security initially discovered one malicious Firefox extension.

Their investigation uncovered the interconnected infrastructure linking all 17 extensions, revealing that these were not isolated incidents but part of a coordinated effort.

Techniques used

The research exposed how the threat actor systematically expanded from Microsoft Edge to Firefox and then to Chrome, adapting their techniques to fit each platform’s security requirements.

The malware’s sophisticated infection mechanism relies on delayed execution to evade detection.

Decoded .png Payload (Source - LayerX Security)
Decoded .png Payload (Source – LayerX Security)

When installed, the extension waits 48 hours or longer before activating, allowing it to slip past security scanning during initial review.

More advanced variants wait up to five days before connecting to remote servers, creating a window where the malware operates while detection tools remain inactive.

The malicious code remains embedded inside the extension’s background script and uses encrypted payloads that are decoded only at runtime, making static analysis nearly impossible and ensuring the threat remains hidden until fully activated on victim machines.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

BodySnatcher Vulnerability Lets Attackers Impersonate ServiceNow

Next Post

Top 15 Best Ethical Hacking Tools for Cybersecurity

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Argo CD ServerSideDiff Flaw Allows Kubernetes Secret Theft
May 6, 2026
Prolific Russian Ransomware Member Sentenced to Group Months
May 6, 2026
Detect Phishing-to-RMM Attacks Analysts Trusted-Tool
May 6, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us