Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI launches a way for enterprises to build and manage AI agents

Anthropic releases Opus 4.6 with new “Agent Teams”

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » DarkSpectre browser extension campaign exposed affecting 8.8 million users worldwide
Identity

DarkSpectre browser extension campaign exposed affecting 8.8 million users worldwide

userBy userDecember 31, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

DarkSpectre Browser Extension

The threat actors behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, were behind a third attack campaign, codenamed DarkSpectre, that allegedly affected 2.2 million users of Google Chrome, Microsoft Edge, and Mozilla Firefox.

This activity has been attributed to a Chinese threat actor and is being tracked by Koi Security under the name DarkSpectre. These campaigns have collectively impacted more than 8.8 million users over seven years.

ShadyPanda was first exposed by the cybersecurity firm earlier this month as targeting users of all three browsers to facilitate data theft, search query hijacking, and affiliate fraud. 5.6 million users were found to be affected, including 1.3 newly identified victims due to over 100 extensions flagged as connected to the same cluster.

It also includes an Edge add-on named “New Tab – Customized Dashboard” with a logic bomb that waits for three days before causing malicious behavior. Delayed activation is an attempt to appear legitimate and gain approval during the review period.

Nine of these extensions are currently active, and a further 85 “dormant sleepers” are benign and intended to attract the user base before being weaponized by malicious updates. Coy said updates were introduced after more than five years in some cases.

The second campaign, GhostPoster, primarily focuses on Firefox users, targeting users with seemingly innocuous utilities and VPN tools that deliver malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. Further investigation into this activity uncovered more browser add-ons, including an extension for Google Translate (developer “charliesmithbons”) for Opera, which has nearly 1 million installations.

cyber security

The third campaign launched by DarkSpectre is The Zoom Stealer. It includes 18 extensions across Chrome, Edge, and Firefox aimed at enterprise meeting intelligence by collecting online meeting-related data such as password-embedded meeting URLs, meeting IDs, topics, descriptions, scheduled times, and registration status.

Below is a list of identified extensions and their corresponding IDs.

Google Chrome –

Chrome Audio Capture (kfokdmfpdnokpmpbjhjbcabgligoelgp) ZED: Zoom Easy Downloader (pdadlkbckhinonakkfkdaadceojbekep) Zoom.us Always Show Join from Web (aedgpiecagcpmehhelbibfbgpfiafdkm) Google Meet Timer (dpdgjbnanmmlikideilnpfjjdbmneanf) CVR: Chrome Video Recorder (kabbfhmcaaodobkfbnnehopcghicgffo) GoToWebinar and GoToMeeting Download recordings of (cphibdhgbdoekmkkcbbaoogedpfibeme) Auto-approve in Meet (ceofheakaalaecnecdkdanhejojkpeai) Adjust Google Meet (emoji, text, camera effects) (dakebdbeofhmlnmjlmhjdmmjmfohiicn) Mute everything in Meet (adjoknoacleghaejlggocbakidkoifle) Google Meet push To Talk (pgpidfocdapogajplhjofamgeboonmmj) Photo Downloader for Facebook, Instagram, + (ifklcpoenaammhnoddgedlapnodfcjpn) Zoomcoder Extension (ebhomdageggjbmomenipfbhcjamfkmbl) Google Meet Auto-Join (ajfokipknlmjhcioemgnofkpmdnbaldi)

Microsoft Edge –

Edge Audio Capture (mhjdjckeljinofckdibjiojbdpapoecj)

Mozilla Firefox –

Twiter X Video Downloader ({7536027f-96fb-4762-9e02-fdfaedd3bfb5}, published by ‘invaliddejavu’) x-video-downloader (xtwitterdownloader@benimaddonum.com, published by ‘invaliddejavu’)

As the extension’s name makes clear, most of them are designed to mimic tools in enterprise video conferencing applications like Google Meet, Zoom, and GoTo Webinar to extract meeting links, credentials, and participant lists in real-time over a WebSocket connection.

We may also collect detailed information about the webinar speaker or host, such as name, job title, bio, profile picture, and company affiliation, along with logo, promotional graphics, and session metadata, each time a user accesses a webinar registration page through a browser that has one of our extensions installed.

cyber security

These add-ons have been found to request access to more than 28 video conferencing platforms, including Cisco WebEx, Google Meet, GoTo Webinar, Microsoft Teams, Zoom, and more, regardless of whether access is required in the first place.

“This is not consumer fraud. This is an infrastructure for corporate espionage,” said researchers Tubal Admoni and Gal Khachamov. “Zoom Stealer represents something more targeted, a systematic collection of corporate meeting intelligence. Users got what was advertised. The extension gained trust and positive feedback, while monitoring ran quietly in the background.”

The cybersecurity firm said the information collected could be used to facilitate corporate espionage by selling to other bad actors, and could enable social engineering and large-scale impersonation operations.

China’s connection to this operation is based on several clues. These include consistent use of command and control (C2) servers hosted on Alibaba Cloud, registration of Internet Content Providers (ICPs) linked to Chinese provinces such as Hubei, code artifacts containing Chinese strings and comments, and fraud schemes specifically targeting Chinese e-commerce platforms such as JD.com and Taobao.

“DarkSpectre likely has more infrastructure in place now. At this point, extensions are legal, so it looks completely legal,” Koi said. “They are still in the trust-building stage, gathering users, earning badges, and waiting.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThese are the best gadgets for your pet at the moment
Next Article Trust Wallet Chrome Extension Hack Loses $8.5 Million in Shai-Hulud Supply Chain Attack
user
  • Website

Related Posts

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

February 5, 2026

Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

February 5, 2026

Buyer’s Guide to AI Usage Control

February 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI launches a way for enterprises to build and manage AI agents

Anthropic releases Opus 4.6 with new “Agent Teams”

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

Pacific Fusion finds cheaper way to run fusion reactors

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.