Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/Prompt Poaching Attack Steals AI Chats via Malicious Extensions
CyberSecurity News

Prompt Poaching Attack Steals AI Chats via Malicious Extensions

Interacting with AI assistants often requires users to open a dedicated browser tab. This approach isolates the AI from other browsing activities, a design choice that enhances privacy. However, it...

Emy Elsamnoudy
Emy Elsamnoudy
March 30, 2026 3 Min Read
0 0

Interacting with AI assistants often requires users to open a dedicated browser tab. This approach isolates the AI from other browsing activities, a design choice that enhances privacy. However, it also limits the AI’s usefulness and contextual awareness.

To bridge this gap, AI-powered browser extensions have surged in popularity, allowing AI agents to seamlessly interact with emails, corporate portals, and personal documents across multiple tabs.

However, this convenience introduces a dangerous trade-off. Expel uncovered a new threat dubbed “prompt poaching,” in which malicious browser extensions silently monitor, copy, and exfiltrate sensitive AI conversations without user consent.

Prompt Poaching Attack

Security researchers have recently responded to dozens of incidents involving Chrome extensions secretly harvesting user interactions with AI assistants.

The mechanics of prompt poaching are straightforward but highly effective. Once installed, these rogue extensions actively monitor open browser tabs.

When they detect a loaded AI client, they utilize API interception or DOM scraping techniques to capture both the user’s inputs and the AI’s responses.

The extension then packages this collected data and quietly transmits it to external command-and-control servers operated by the developers.

Threat actors deploy these malicious capabilities through two primary vectors. The first method involves cloning popular, legitimate extensions and injecting them with data-stealing code.

For example, attackers have successfully distributed several malicious clones of tools originally developed by AITOPIA.

We have seen this with “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” using the extension ID fnmihdojmnkclgjpcoonokmkhjpjechg.

“AI Sidebar with Deepseek, ChatGPT, Claude, and more” operating under the ID inhcgfpbfdjbjogdfjbclgolkmhnooop. And “Talk to ChatGPT” utilizing the ID hoinfgbmegalflaolhknkdaajeafpilo.

The second method involves compromising an established tool with a wide user base.

A notable example is Urban VPN Proxy, tracked under the extension ID eppiocemhmnlbhjplcgkofciiegomcon, which operated as a legitimate service for some time.

According to Expel research, once a large enough audience was established, the developers silently introduced prompt poaching capabilities in a subsequent update, immediately exposing all existing users to data exfiltration.

Organizational Risks and Impact

The exfiltration of AI prompts presents severe risks to corporate security and personal privacy.

Employees frequently rely on AI assistants to draft strategic emails, summarize proprietary documents, or debug internal code, inadvertently feeding highly sensitive data directly into these tools.

When prompt poaching occurs, it exposes intellectual property, confidential customer data, and proprietary business logic.

This stolen information can easily fuel targeted phishing campaigns, facilitate identity theft, or end up brokered on underground hacker forums.

To combat the threat of prompt poaching, organizations must adopt strict browser management policies rather than relying on user discretion.

Security teams should proactively restrict unapproved plugins using Group Policy and centralized browser management consoles.

Furthermore, organizations should address internal productivity gaps by steering employees toward official desktop clients or first-party extensions developed directly by trusted AI vendors.

Finally, conducting periodic audits of installed extensions and monitoring network traffic for anomalous outbound connections can help identify and neutralize these stealthy threats before significant data loss occurs.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerphishingSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

VoidLink Malware Framework: AI-Assisted Threats Shows Experimental

Next Post

India to Ban Sale of Hikvision, TP-Link, CCTV Products

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us