# 108 Malicious Chrome Extensions Steal Google and Telegram Credentials from 20,000 Users in Coordinated Campaign
A massive coordinated attack has compromised over 20,000 users through a network of 108 malicious Google Chrome extensions designed to harvest sensitive credentials and inject malicious content directly into web browsing sessions. Security researchers at Socket have uncovered the campaign, which represents a sophisticated infrastructure-level threat targeting both consumer and enterprise users.
The extensions, published across the Chrome Web Store under innocuous names, funnel stolen authentication tokens and user data to centralized command-and-control (C2) servers while simultaneously injecting advertisements and arbitrary JavaScript code into every webpage visited by infected users.
## The Threat: A Coordinated Data Harvesting Operation
The cluster of 108 extensions operates as a unified data harvesting network, sharing common infrastructure and operating procedures. Key characteristics of the threat include:
The extensions were designed to masquerade as legitimate productivity tools, browser utilities, or customization add-ons. This deception allowed them to pass Chrome Web Store review processes and accumulate significant user bases before detection.
## Background and Context: The Chrome Extension Supply Chain Risk
Google Chrome extensions represent a critical security surface. Unlike web applications sandboxed by the browser, extensions operate with elevated permissions and can access browsing history, modify web content, intercept network traffic, and interact with sensitive APIs.
### Why Extensions Are High-Value Targets
Extensions sit at the intersection of three valuable attack objectives:
1. Authentication interception — Extensions can capture login credentials, session tokens, and API keys before encryption
2. Content injection — Attackers can modify what users see, redirecting clicks or stealing form data
3. Scale and legitimacy — The Chrome Web Store provides distribution to millions while lending apparent legitimacy
The Chrome Web Store hosts approximately 200,000 extensions. While Google employs automated scanning and manual review, determined attackers continuously evolve techniques to evade detection.
### Historical Precedent
This campaign echoes previous incidents:
| Year | Incident | Extensions | Users Affected |
|------|----------|-----------|-----------------|
| 2020 | Password-stealing extensions | 49 | 100,000+ |
| 2021 | CoinHive cryptomining | 28+ | Millions |
| 2023 | Ad-injection networks | 100+ | 30,000+ |
| 2025 | Current campaign | 108 | 20,000+ |
The rising sophistication and scale of extension-based attacks suggests attackers view the Chrome ecosystem as a reliable vector for credential theft and malware distribution.
## Technical Details: How the Attack Works
### Infection Chain
1. Initial compromise: User installs what appears to be a legitimate extension from the Chrome Web Store
2. Permission exploitation: Extension requests broad permissions (e.g., "Access all data on websites you visit")
3. Background communication: Extension establishes encrypted channel to C2 infrastructure
4. Data exfiltration: Captures Google session tokens, Telegram authentication, and other sensitive data
5. Content injection: Injects ads and JavaScript payloads into web pages in real time
### Command-and-Control Infrastructure
The 108 extensions communicate with shared C2 servers, suggesting centralized campaign management. This architecture enables attackers to:
Socket's analysis identified the C2 infrastructure through network traffic patterns and code analysis, allowing researchers to link extensions that would otherwise appear unrelated.
### Data Theft Methodology
The extensions specifically target:
This data combination enables identity theft, account compromise, spear-phishing attacks, and lateral movement into organizational networks.
## Implications for Organizations and Users
### Immediate Risks
Organizations face multiple threat vectors:
### Enterprise Impact
For organizations using Chrome as the primary browser:
### Consumer Risks
Individual users face:
## Detection and Removal
### Identifying Infected Extensions
Users should review installed extensions for:
### Known Malicious Extensions
Socket has published the full list of 108 extensions. Users should:
1. Visit chrome://extensions/ to view all installed extensions
2. Cross-reference against Socket's published vulnerability database
3. Immediately remove any matching extensions
4. Change passwords for Google and Telegram accounts
5. Review recent account activity logs for unauthorized access
### Browser Reset (Recommended)
After removing extensions, users should:
1. Change all password authentication (especially Google and Telegram)
2. Review Chrome account settings and remove unrecognized devices
3. Check Gmail account recovery options and authorized apps
4. Clear browsing cache and cookies
5. Review browser extensions whitelist policies (enterprise environments)## Recommendations
### For Individual Users
### For Organizations
### For Enterprise IT
ExtensionInstallBlocklist and ExtensionInstallWhitelist Chrome policies## Conclusion
The discovery of 108 coordinated malicious extensions demonstrates the sophistication of modern browser-based attacks. The combination of scale, infrastructure coordination, and dual capabilities (credential theft + content injection) makes this campaign a significant threat to both individual users and organizations.
The Chrome extension ecosystem remains a lucrative attack surface due to high user trust, broad permissions, and legitimate distribution channels. Defense requires vigilant users, restrictive enterprise policies, and continued scrutiny of the Chrome Web Store to prevent similar campaigns from reaching mass scale in the future.
Users who suspect compromise should immediately review their account security logs, change passwords, and contact relevant platforms (Google, Telegram) for account recovery assistance.