That AI Extension Helping You Write Emails? It’s Reading Them First

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

Unit 42 researchers identified 18 malicious Chrome extensions disguised as AI productivity tools. These extensions employ techniques including RATs with WebSocket C2 channels, adversary-in-the-browser DOM scraping (e.g., reading Gmail content), infostealers harvesting AI API keys and personal data, search hijackers with cross-device persistent tracking, brand impersonation, and spyware using proxy auto-configuration scripts. Notably, threat actors are using LLMs to accelerate malware production. All 18 extensions were reported to Google, which removed or warned the publishers. Users are advised to scrutinize extension permissions and only install from trusted sources.

15m read timeFrom unit42.paloaltonetworks.com
Post cover image
Table of contents
Executive SummaryExamples of Extensions Disguised as AI ToolsBrowser Extensions Expand the Client-Side Attack SurfaceA RAT: MCP Server AI Automation ExtensionAdversary in the Browser (AitB): Supersonic AIInfostealer: Reverse Recruiting — AI Job Application AssistantSearch Hijacker: Chat AI for ChromeBrand Impersonator: AI Photo and Video EditorSpyware: 会译:一站式 AI 翻译 Agent|对照式DeepL翻译|DeepSeek划词翻译|免费AI-Accelerated CampaignsConclusionAcknowledgmentsIndicators of CompromiseAdditional Resources

Sort: