Source: Pixabay
A new cybersecurity breach has put over 3.2 million Google Chrome users at risk after hackers hijacked popular browser extensions, injecting malicious scripts and redirecting web traffic for fraud. This Google Chrome extensions cyberattack, which researchers believe was executed through a supply chain compromise, allowed cybercriminals to exploit trusted extensions and distribute harmful updates without users realizing it.
A total of 16 widely used Google Chrome extensions, including ad blockers, emoji keyboards, and screen capture tools, were identified as compromised. These extensions, which initially appeared legitimate, were later updated with obfuscated scripts designed to steal data, modify HTTP requests, and inject unauthorized advertisements. This meant that millions of unsuspecting users had already been granted permissions that enabled attackers to manipulate web activity in real time.
Cybersecurity researchers traced the attack back to compromised developer accounts, where hackers either obtained access through phishing schemes or tricked developers into transferring control of their extensions. Once in control, the attackers pushed malicious updates through the Chrome Web Store, bypassing traditional security checks.
The cyberattack on the Google Chrome extension is reminiscent of past supply chain breaches, where cybercriminals exploit trusted software to distribute malware. Because browser extension updates happen automatically, users had no indication that their trusted tools had been weaponized against them.
Security experts found that these extensions contained hidden service worker functionality that performed the following actions:
The compromised extensions could:
While Google has removed these extensions from the Chrome Web Store, they will not be automatically uninstalled from users’ browsers. If you have installed any of the affected extensions, follow these steps immediately:
To ensure no residual malware remains in your browser:
Browser extensions can enhance your online experience, but they can also pose significant risks. Here are some best practices to stay safe:
This large-scale cyberattack highlights the growing risks associated with browser extensions and the ease with which attackers can exploit them. With cybercriminals targeting even well-known and trusted extensions, users must remain vigilant and proactive in protecting their online security.
By following best practices and staying informed about cybersecurity threats, you can minimize risks and maintain a safer browsing experience.
This week’s The Cyber Express roundup covers ransomware, AI risks, geopolitical threats, and key developments in global cybersecurity news.
DeepSeek changed the calculation. When the House Select Committee on China concluded in early 2025 that the Chinese AI company…
The Apple age verification measures align with broader enforcement efforts under the UK’s online safety framework.
EU and ENISA act to protect the bedrock cyber vulnerability CVE Program after funding concerns raise risks of fragmentation and…
Energy sector ransomware surged in 2025 as ransomware groups exploited vulnerabilities and used FrostyGoop malware to disrupt infrastructure.
Reporting mechanisms for illegal content are also part of the Digital Services Act child protection investigation.
This website uses cookies. By continuing to use this website you are giving consent to cookies being used.
Read More