Over 500,000 VKontakte accounts hijacked through malicious Chrome extensions
好的,我现在要帮用户总结一篇文章的内容,控制在100字以内。首先,我需要仔细阅读用户提供的文章内容,理解其主要信息。 文章讲的是网络安全研究人员发现了一个恶意软件活动,通过伪装成自定义工具的Google Chrome扩展程序,劫持了VKontakte社交网络上的50万账户。这些扩展程序控制了账户,更改设置,并在用户不知情的情况下订阅攻击者控制的群组。此外,这些扩展程序还能自动更新,使攻击者能够推送新的恶意代码。研究人员追踪到一个威胁行为者,并指出浏览器扩展程序是黑客的热门目标。 接下来,我需要将这些关键点浓缩成一段简洁的文字。要注意不要使用“文章内容总结”这样的开头,直接描述即可。同时要确保不超过100字。 可能的结构是:恶意软件通过Chrome扩展劫持VKontakte账户,伪装成自定义工具,控制账户、更改设置、订阅群组,并自动更新。研究人员追踪到威胁行为者。 现在检查字数是否在限制内,并确保信息准确无误。 </think> 研究人员发现通过伪装成自定义工具的Chrome扩展程序劫持了VKontakte社交网络上的50万账户。这些扩展程序控制账户、更改设置、订阅攻击者群组,并自动更新以推送恶意代码。 2026-2-16 18:31:6 Author: therecord.media(查看原文) 阅读量:3 收藏

Cybersecurity researchers have uncovered a malware campaign that reportedly hijacked half a million accounts on VKontakte — Russia’s most popular social network — through Google Chrome browser extensions disguised as customization tools.

In a report published last week, researchers at Koi Security said they identified a network of five Chrome extensions marketed as tools to change themes and enhance the VK user experience. The extensions took control of infected accounts and manipulated settings without users’ consent.

Collectively installed more than 500,000 times, the extensions could automatically subscribe victims to attacker-controlled groups, reset personal settings every 30 days, and exploit weaknesses in VK’s security protections to carry out unauthorized actions.

If a victim paid for extra themes or features, the malware would record the payment and unlock additional functionality while continuing to abuse their account behind the scenes.

The extensions updated automatically and silently, meaning the attacker could push new malicious code with no user interaction required.

Researchers traced the operation to a single threat actor operating under the GitHub alias “2vk,” who used VKontakte itself as part of the malware’s infrastructure, making the campaign harder to detect and block.

The forced group subscriptions helped amplify the malware’s reach. Each time a user visited the social network with an infected extension installed, there was a high chance they would be automatically subscribed to the attacker’s group, which amassed millions of followers.

At least one major extension — VK Styles — was removed from the Chrome Web Store on Feb. 6 after researchers flagged it.

The campaign appears to have been active since mid-2025 and persisted through January 2026. Its targets reportedly include Russian-speaking users, as well as users across Eastern Europe, Central Asia and Russian diaspora communities worldwide.

Browser extensions are an attractive target for hackers because they have deep access to browser data, including authenticated sessions and sensitive information. They are also easy to update and often not subjected to the same scrutiny as traditional software.

Last January, cybersecurity researchers identified 36 Chrome extensions injected with data-stealing code, most of them related to artificial intelligence (AI) tools and virtual private networks (VPNs). Those extensions, collectively used by roughly 2.6 million people, included third-party tools such as ChatGPT for Google Meet, Bard AI Chat and VPNCity.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/500000-vkontakte-accounts-hijacked-chrome-extensions
如有侵权请联系:admin#unsafe.sh