Fake AI Chrome extensions with 300K users steal credentials, emails
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。我得先仔细看看这篇文章的内容。 文章讲的是30个恶意的Chrome扩展,被超过30万用户安装了。这些扩展伪装成AI助手,窃取用户的凭证、邮件内容和浏览信息。研究人员发现了这个恶意活动,命名为AiFrame。这些扩展通过隐藏的iframe加载远程内容,并收集用户访问的网站信息,特别是针对Gmail的数据。用户可能需要检查LayerX提供的列表,确认是否安装了这些恶意扩展,并建议重置密码。 我需要把这些关键点浓缩到100字以内。首先提到30个恶意扩展,被大量用户安装。然后说明它们伪装成AI助手,窃取信息。接着提到研究人员发现的情况,以及它们如何运作。最后提醒用户检查和重置密码。 可能需要调整句子结构,确保信息完整且简洁。比如:“30个恶意Chrome扩展伪装成AI助手窃取用户数据”这样开头,然后说明影响和建议措施。 确保不超过字数限制,同时涵盖主要信息:恶意软件、功能、影响、研究人员发现、以及用户应对措施。 </think> 30款伪装成AI助手的恶意Chrome扩展被发现,已感染超30万用户。这些扩展通过隐藏iframe窃取凭证、邮件内容及浏览数据,并针对Gmail实施定向攻击。研究人员已识别相关恶意程序并建议用户检查感染情况并重置密码以保障安全。 2026-2-12 13:45:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:2 收藏

Fake AI Chrome extensions with 300K users steal credentials, emails

A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information.

Some of the extensions are still present in the Chrome Web Store and have been installed by tens of thousands of users, while others show a small install count.

Researchers at browser security platform LayerX discovered the malicious extension campaign and named it AiFrame. They found that all analyzed extensions are part of the same malicious effort as they communicate with infrastructure under a single domain, tapnetic[.]pro.

Wiz

According to them, the most popular extension in the AiFrame campaign had 80,000 users and was called Gemini AI Sidebar (fppbiomdkfbhgjjdmojlogeceejinadg), but it is no longer on the Chrome Web Store.

However, BleepingComputer found that other extensions with thousands of users are still present on Google's repository for Chrome extensions. It should be noted that the names may be different in some cases, but the identification is the same.

  1. AI Sidebar (gghdfkafnhfpaooiolhncejnlgglhkhe) – 70,000 users
  2. AI Assistant (nlhpidbjmmffhoogcennoiopekbiglbp) – 60,000 users
  3. ChatGPT Translate (acaeafediijmccnjlokgcdiojiljfpbe) – 30,000 users
  4. AI GPT (kblengdlefjpjkekanpoidgoghdngdgl) – 20,000 users
  5. ChatGPT (llojfncgbabajmdglnkbhmiebiinohek) – 20,000 users
  6. AI Sidebar (djhjckkfgancelbmgcamjimgphaphjdl) – 10,000 users
  7. Google Gemini (fdlagfnfaheppaigholhoojabfaapnhb) – 10,000 users

LayerX found that all 30 extensions share the same internal structure, JavaScript logic, permissions, and backend infrastructure.

The malicious browser add-ons do not implement AI functionality locally; instead, they deliver the promised feature by rendering a full-screen iframe to load content from a remote domain.

This, by itself, is risky, as publishers can change the extensions’ logic at any time without pushing an update - just like in the case of Microsoft Office Add-ins - thus avoiding a new review.

In the background, the extensions extract page content from websites the user visits, including sensitive authentication pages, using Mozilla’s Readability library.

LayerX says that a subset of 15 extensions specifically targets Gmail data, using a dedicated content script that runs at ‘document_start’ on ‘mail.google.com’ and injects UI elements.

The script reads visible email content directly from the DOM and repeatedly extracts email thread text via ‘.textContent.’ The researchers note that even email drafts can be captured.

“When Gmail-related features such as AI-assisted replies or summaries are invoked, the extracted email content is passed into the extension’s logic and transmitted to third-party backend infrastructure controlled by the extension operator,” LayerX explains in a report today.

“As a result, email message text and related contextual data may be sent off-device, outside of Gmail’s security boundary, to remote servers.”

The extensions also feature a remotely triggered voice recognition and transcript generation mechanism using the ‘Web Speech API,’ returning the results to the operators. Depending on the granted permissions, the extensions may even siphon conversations from the victim’s environment.

BleepingComputer has contacted Google for a comment on LayerX findings, but we have not received a response by publication time.

It is recommended to check LayerX's list of indicators of compromise for the complete set of malicious extensions. If compromise is confirmed, users should reset passwords for all accounts.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/fake-ai-chrome-extensions-with-300k-users-steal-credentials-emails/
如有侵权请联系:admin#unsafe.sh