Malicious Chrome AI Extensions Attacking 260,000 Users via Injected IFrames


Malicious Chrome AI Extensions Attacking 260000 Users via Injected IFrames

A coordinated campaign is using malicious Chrome extensions that impersonate popular AI tools like ChatGPT, Claude, Gemini, and Grok.

These fake “AI assistants” spy on users through injected, remote-controlled iframes, turning helpful browser add-ons into surveillance tools. More than 260,000 users have installed these extensions.

Security researchers identified at least 30 Chrome extensions promoted as AI tools for summarizing, chatting, translating, generating images, and boosting Gmail productivity.

Although they use different names and icons, they share the same codebase, permissions, and backend infrastructure, confirming a single organized operation.

Some extensions were even marked as “Featured” in the Chrome Web Store, increasing trust and downloads.

Here is the malicious extensions table in a clean format:

google

Extension IDNameInstalls
nlhpidbjmmffhoogcennoiopekbiglbpAI Assistant50,000
gcfianbpjcfkafpiadmheejkokcmdkjlLlama147
fppbiomdkfbhgjjdmojlogeceejinadgGemini AI Sidebar80,000
djhjckkfgancelbmgcamjimgphaphjdlAI Sidebar9,000
llojfncgbabajmdglnkbhmiebiinohekChatGPT Sidebar10,000
gghdfkafnhfpaooiolhncejnlgglhkheAI Sidebar50,000
cgmmcoandmabammnhfnjcakdeejbfimnGrok261
phiphcloddhmndjbdedgfbglhpkjcffhAsking Chat Gpt396
pgfibniplgcnccdnkhblpmmlfodijppgChatGBT1,000
nkgbfengofophpmonladgaldioelckbeChat Bot GPT426
gcdfailafdfjbailcdcbjmeginhncjkbGrok Chatbot225
ebmmjmakencgmgoijdfnbailknaaiffhChat With Gemini760
baonbjckakcpgliaafcodddkoednpjgfXAI138
fdlagfnfaheppaigholhoojabfaapnhbGoogle Gemini7,000
gnaekhndaddbimfllbgmecjijbbfpabcAsk Gemini1,000
hgnjolbjpjmhepcbjgeeallnamkjnfgiAI Letter Generator129
lodlcpnbppgipaimgbjgniokjcnpiiadAI Message Generator24
cmpmhhjahlioglkleiofbjodhhiejheiAI Translator194
bilfflcophfehljhpnklmcelkoiffapbAI For Translation91
cicjlpmjmimeoempffghfglndokjihhnAI Cover Letter Generator27
ckneindgfbjnbbiggcmnjeofelhflhajAI Image Generator Chat GPT249
dbclhjpifdfkofnmjfpheiondafpkoedAi Wallpaper Generator289
ecikmpoikkcelnakpgaeplcjoickgacjAi Picture Generator813
kepibgehhljlecgaeihhnmibnmikbngaDeepSeek Download275
ckicoadchmmndbakbokhapncehanaeniAI Email Writer64
fnjinbdmidgjkpmlihcginjipjaoapolEmail Generator AI881
gohgeedemmaohocbaccllpkabadoogplDeepSeek Chat1,000
flnecpdpbhdblkpnegekobahlijbmfokChatGPT Picture Generator251
acaeafediijmccnjlokgcdiojiljfpbeChatGPT Translate30,000
kblengdlefjpjkekanpoidgoghdngdglAI GPT20,000
idhknpoceajhnjokpnbicildeoligdghChatGPT Translation1,000
fpmkabpaklbhbhegegapfkenkmpipickChat GPT for Gmail1,000

When one extension is removed, attackers quickly upload a clone with a new name and ID, a tactic known as “extension spraying.”

Instead of running AI features locally, the extensions load a full-screen iframe from attacker-controlled domains such as tapnetic[.]pro.

IFrame Injection (Source: Layerx Security)
IFrame Injection (Source: Layerx Security)

This allows operators to change functionality remotely without updating the extension in the Chrome Web Store.

Once installed, the extensions can: Extract readable content from active tabs, including authenticated pages.

Capture voice input using the Web Speech API. Track installs and uninstalls using hidden telemetry. A Gmail-focused cluster of 15 extensions injects scripts directly into mail. google[.]com.

These scripts monitor page changes and repeatedly collect visible email content, including threads, drafts, and replies, and send it to attacker-controlled servers.

Tapnetic.pro subdomains – VirusTotal.com (Source: LayerxSecurity)
Tapnetic.pro subdomains – VirusTotal.com (Source: LayerxSecurity)

All identified extensions communicate with domains under tapnetic[.]pro and onlineapp[.]pro.

Each extension uses themed subdomains (such as chatgpt. tapnetic[.]pro or gemini. tapnetic[.]pro), but connects to the same backend system.

When one high-install extension was removed in February 2025, an identical replacement appeared within weeks using the same malicious architecture.

According to LayerxSecurity researcher, the campaign also relies on multiple Gmail accounts to manage and publish extensions.

TacticTechnique CodeTechnique Name
Resource DevelopmentLX2.003 (T1583)Acquire Infrastructure
Initial AccessLX3.004 (T1189)Drive-by Compromise
Initial AccessLX3.003 (T1199)Trusted Relationship
ExecutionLX4.003Script Execution
Defense EvasionLX7.011 (T1036)Masquerading
Credential AccessLX8.007 (T1557)Adversary-in-the-Middle
CollectionLX10.012Web Communication Data Collection
CollectionLX10.005Collect User’s Information
Command and ControlLX11.004Establish Network Connection
Command and ControlLX11.005Web Service-Based C2
ExfiltrationLX12.001Data Exfiltration

The operation uses brand impersonation, malicious browser extensions, and web-based command-and-control infrastructure.

By relying on remote iframes, attackers bypass install-time reviews and maintain full control after deployment.

Defenders should: Audit AI-branded Chrome extensions in their environments. Monitor for suspicious iframe injection and unusual Gmail DOM access.

Watch for outbound traffic to tapnetic[.]pro and related domains. Prioritize runtime monitoring over static extension reviews.

Organizations should treat AI-themed browser extensions with caution and enforce strict extension management policies.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link