New Malware Attack Deploys Malicious Chrome & Edge Extensions to Steal Data

A newly identified malware campaign is actively targeting users across Brazil and several other countries by distributing malicious browser extensions for Google Chrome, Microsoft Edge, and Brave.

Security experts from Positive Technologies report that the campaign, dubbed “Phantom Enigma,” began in early 2025 and leverages phishing emails originating from compromised business servers to increase the likelihood of successful infection.

Technical Attack Flow

The attack is initiated via tailored phishing messages, typically masquerading as invoices or important documents.

These emails either contain malicious attachments (such as BAT or MSI files) or links to download malware-laden installers.

Once executed, the BAT scripts ensure the payload is run with administrative privileges, downloads a PowerShell script, and checks if it’s running within a virtual environment evading analysis and sandboxing.

The PowerShell script then establishes persistence by registering itself in the Windows startup registry (HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run) and disables User Account Control for further system compromise.

Malicious Chrome
a PowerShell script within the Inno Setup installer

A core component of the campaign is the deployment of malicious extensions. Through manipulation of registry keys (HKLM\Software\Policies\Google\Chrome\ExtensionInstallForcelist), the attacker forces Chrome, Edge, or Brave to silently install rogue extensions from external sources or local files.

These extensions are designed to intercept banking credentials and authentication tokens, particularly targeting the Banco do Brasil’s online services.

The malicious code in the extensions utilizes background JavaScript to monitor web requests, capture credentials, and exfiltrate data to remote command-and-control (C2) servers, including financial-executive.com.

Multi-Vector Distribution

In addition to browser extension attacks, researchers found that the same infrastructure is used to distribute Remote Access Tools (RATs) such as Mesh Agent and PDQ Connect Agent.

Malicious Chrome
Attack chain using a browser extension

These RATs are delivered via MSI installers and are capable of cross-platform infections, including Windows, Linux, and macOS, supporting various processor architectures.

Once installed, Mesh Agent connects to its C2 infrastructure via secure WebSocket and HTTPS channels, granting attackers full remote control and the ability to laterally move within corporate networks.

Unlike the extension-based attack (which hijacks a single user session), the RAT deployment threatens entire organizational infrastructures, allowing attackers to pivot, escalate privileges, and propagate across a network.

Extensive analysis revealed a clustered infrastructure involving multiple domains often sharing a single IP address or TLS certificate.

The campaign utilizes domains such as computadorpj.com, clientepj.com, and financial-executive.com, with frequent overlap in hosting and certificate metadata to obscure attribution and facilitate rapid domain swapping in case of takedown.

Malicious extensions are distributed both from the Chrome Web Store (now removed) and via local injection techniques specifically modifying browser LNK (shortcut) files to include the --load-extension parameter, thereby loading extension code stored in hidden directories.

While Brazil remains the primary target, compromised entities span Colombia, Mexico, Vietnam, Russia, and Europe with over 700 confirmed malicious extension downloads.

Attackers focus on stealing online banking credentials, and organizational victims have also been leveraged to send phishing emails, worsening the campaign’s spread.

Security teams are advised to monitor for persistence mechanisms in registry and LNK files, scrutinize network traffic to suspicious domains, and audit browser extension installations for unauthorized entries.

Indicators of Compromise (IOC)

TypeIndicatorDescription/Notes
IP Address18.231.162.77
107.174.231.26
142.54.185.178
54.207.88.51
C2 servers and malware infrastructure
Domainsatual2025.com
clientepj.com
computadorpj.com
financial-executive.com
hamrah-tejarat.com
nfe-fiscal.com
ranchocentral.com
servidor2025.com
syarousi-search.com
nf-eletronica.org
relay.lombrelone.com
webrelayapi.online
C2 and distribution domains
GitHub Repohttps://github.com/contaaws20251Used for malware/installer delivery
Extension IDsnplfchpahihleeejpjmodggckakhglee
ckkjdiimhlanonhceggkfjlmjnenpmfm
lkpiodmpjdhhhkdhdbnncigggodgdfli
Malicious Chrome/Edge extensions
File Hashes (MD5)0353a0dbc9f016da09303ee1a3b75d2f
0844863f61271a66aa015ad9dcf06e51
0906079ea36374150e8d617145021147
Malicious installers and scripts (partial list)

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here