{"id":1203,"date":"2025-07-08T16:51:36","date_gmt":"2025-07-08T16:51:36","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2025\/07\/08\/researchers-reveal-18-malicious-chrome-and-edge-extensions-disguised-as-everyday-tools\/"},"modified":"2025-07-08T16:51:36","modified_gmt":"2025-07-08T16:51:36","slug":"researchers-reveal-18-malicious-chrome-and-edge-extensions-disguised-as-everyday-tools","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2025\/07\/08\/researchers-reveal-18-malicious-chrome-and-edge-extensions-disguised-as-everyday-tools\/","title":{"rendered":"Researchers Reveal 18 Malicious Chrome and Edge Extensions Disguised as Everyday Tools"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>A set of 18 malicious browser extensions that are still available to download on Google Chrome and Microsoft Edge have been identified by a team of security researchers at Koi Security.<\/p>\n<p>These extensions masquerade as productivity and entertainment tools across diverse categories, including emoji keyboards, weather forecasts, video speed controllers, VPN proxies for Discord and TikTok, dark themes, volume boosters and YouTube unblockers.<\/p>\n<p>They all offer a functional service, which is advertised, while secretly implementing browser surveillance and hijacking capabilities. They have infected over 2.3 million browser users to date.<\/p>\n<p>Several of these extensions were verified by Google and Microsoft or had featured placement on the Chrome Web Store or the Edge Add-ons Store.<\/p>\n<p>While each extension operates with its own command and control subdomain, giving the appearance of separate operators, the researchers discovered that the 18 extensions are all part of the same centralized attack infrastructure.<\/p>\n<p>The campaign has been dubbed RedDirection and Koi Security shared their findings in a July 8 report on Dardikman\u2019s Medium page.<\/p>\n<h2><strong>Legitimate Extensions Turned Malicious in Later Updates<\/strong><\/h2>\n<p>The first extension the Koi Security researchers identified, named \u2018Color Picker, Eyedropper \u2014 Geco colorpick,\u2019 appears as a seemingly benign Chrome extension with over 100,000 installs and over 800 reviews.<\/p>\n<p>In reality, this extension also delivers a malicious command-and-control (C2) backdoor, allowing an attacker to track every website visited by its users.<\/p>\n<p>Upon finding this extension, Idan Dardikman and his fellow researchers at Koi Security dug deeper.<\/p>\n<p>They found 11 Chrome extensions and seven Edge extensions with similar capabilities.<\/p>\n<p>To avoid being blocked by Google\u2019s and Microsoft\u2019s security filters, the RedDirection extensions were initially created as clean extensions and later updated with malware in subsequent versions that installed automatically, with no user input &#8211; sometimes years later the initial version was released.<\/p>\n<p>\u201cGoogle&#8217;s and Microsoft\u2019s verification process failed to detect sophisticated malware across eleven different extensions, instead promoting several to users through verification badges and featured placement,\u201d Dardikman explained.<\/p>\n<p>The malicious code that was added to the extensions allows an attacker to:<\/p>\n<ul>\n<li>Capture the URLs\u00a0of the pages the users visit<\/li>\n<li>Send them to a remote server\u00a0along with the users\u2019 unique tracking IDs<\/li>\n<li>Receive potential redirect URLs\u00a0from the C2 server<\/li>\n<li>Automatically redirect the browser\u00a0if instructed<\/li>\n<\/ul>\n<p>This campaign \u201cperfectly demonstrates how sophisticated threat actors are exploiting the trust signals we rely on,\u201d wrote Dardikman in the report.<\/p>\n<p>For Chrome and Edge users who have one of the 18 malicious extensions installed, Dardikman recommended immediately removing them, clearing the browser data to remove stored tracking identifiers, running a complete system malware scan\u00a0to check for additional infections and monitoring their accounts\u00a0for any suspicious activity if they visited sensitive sites.<\/p>\n<p>The Koi Security team of researchers reported their findings to Google and Microsoft, but neither company responded at the time of writing.<\/p>\n<p><em>Read now: Security Experts Flag Chrome Extension Using AI Engine to Act Without User Input<\/em><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A set of 18 malicious browser extensions that are still available to download on Google Chrome and Microsoft Edge have been identified by a team of security researchers at Koi Security. These extensions masquerade as productivity and entertainment tools across diverse categories, including emoji keyboards, weather forecasts, video speed controllers, VPN proxies for Discord and<\/p>\n","protected":false},"author":2,"featured_media":1204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/07\/1203-1c92fffc-ff4b-426d-8855-3dc556c46883-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/1203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=1203"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/1203\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/1204"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=1203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=1203"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=1203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}