40+ Malicious Chrome Extensions Disguised as Popular Brands Stealing Sensitive Data

A wave of over 40 malicious Chrome browser extensions, many still available in the official Chrome Web Store, has been discovered by security researchers at LayerX.

These extensions, identified as components of at least three coordinated phishing campaigns, are actively stealing sensitive information from unsuspecting users by masquerading as legitimate, popular brands.

The initial discovery was made by the DomainTools Intelligence (DTI) team, who flagged a series of suspicious domains interacting with browser extensions that imitated well-known digital services.

Building on this, LayerX analysts conducted further technical investigation, correlating flagged URLs with Chrome extension metadata and exposing the full ecosystem behind the threat.

 Chrome Extension
Brand Masquerading

Their analysis identified extension IDs, names, publisher domains, and release/update timelines, revealing a sophisticated and rapidly evolving malicious infrastructure.

AI-Driven Scalability

One of the most striking features of this campaign is the use of AI-generated content to create extension pages with nearly identical structures, formatting, and promotional language.

This automation has allowed attackers to scale their operations quickly, deploying dozens of unique but similarly disguised extensions with minimal human effort.

These fake tools mimic widely used brands such as Fortinet’s FortiVPN, DeepSeek AI, Calendly, various YouTube helper applications, and cryptocurrency utilities like DeBank, among others. The attackers employ a multifaceted strategy of deception.

They register domain names closely resembling those of the impersonated brands (for example, “calendlydaily[.]world” and “calendly-director[.]com”) and supply publisher contact addresses using convincing formats such as “support@[malicious-domain]”, lending an additional air of legitimacy.

Notably, publisher details use custom domains rather than generic email services, further enhancing their apparent credibility in the Chrome Store.

Persistent Data Theft

These malicious extensions typically request excessive permissions, allowing threat actors persistent access to browser sessions.

Once installed, they can harvest authentication tokens, personal data, and sensitive corporate information, while also enabling attackers to impersonate users or breach internal networks.

Some extensions even remain functional and dangerous after being removed from the Chrome Store, as existing installations persist in users’ browsers unless manually uninstalled.

The ongoing campaign highlights a significant blind spot for both individuals and organizations—the security of browser extensions. Malicious plugins can bypass endpoint defenses, facilitating credential theft and lateral movement within enterprise environments.

Experts stress the need for proactive and layered defensive measures. Organizations should consider the following steps:

  • Enforce strict extension policies via management tools, blocking unknown or recently published extensions and those demanding suspicious permissions.
  • Regularly audit installed browser extensions, especially those mimicking popular brands or originating from non-official domains.
  • Remove extensions immediately if they have been identified as malicious, even if they are no longer present in the Chrome Store.

LayerX has responded by offering a browser security platform that continuously identifies and blocks risky extensions, automates detection of suspicious behaviors, and enforces granular security policies across organizational environments.

Indicators of Compromise (IOC)

Extension IDExtension NamePublisher Domain
ccollcihnnpcbjcgcjfmabegkpbehnipFortiVPNforti-vpn[.]com
aeibljandkelbcaaemkdnbaacppjdmomManus AI | Free AI Assistantmanusai[.]sbs
fcfmhlijjmckglejcgdclfneafoehafmSite Statssitestats[.]world
abbngaojehjekanfdipifimgmppiojplClothing Brand Name Generatorclothingbrandnamegenerator[.]app
dohmiglipinohflhapdagfgbldhmoojlDeBank – Digital Assetswinchester[.]abram37
acmiibcdcmaghndcahglamnhnlmcmlngAML Sector | Free Crypto AML Checkeramlsector[.]com
mipophmjfhpecleajkijfifmffcjdiacCrypto Whales Visioncryptowhalesvision[.]world
cknmibbkfbephciofemdjndbgebggnkcCalendly Daily | Free Meeting Scheduling Softwarecalendly-daily[.]com
gmigkpkjegnpmjpmnmgnkhmoinpgdnfcCalendly Docket | Free Meeting Scheduling Softwarecalendly-docket[.]com
ahgccenjociolkbpgbfibmfclcfnlaeiCreativeHunter – Free tool for Facebookcreativehunter[.]world

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here