GBHackers

Malicious Chrome AI Extensions Target 260,000 Users with Injected Iframes


As AI tools like ChatGPT, Claude, Gemini, and Grok gain mainstream adoption, cybercriminals are weaponizing their popularity to distribute malicious browser extensions.

Security researchers have uncovered a coordinated campaign involving 30 Chrome extensions that masquerade as legitimate AI assistants while secretly deploying dangerous surveillance capabilities affecting over 260,000 users.

The malicious extensions pose as AI-powered tools for summarization, chat assistance, writing help, and Gmail integration.

Despite appearing legitimate in the Chrome Web Store, where several were even featured as recommended tools, these extensions share identical underlying code, permissions, and backend infrastructure controlled through the tapnetic.pro domain.

Rather than implementing functionality locally, they embed remote server-controlled interfaces using privileged proxies that grant external servers access to sensitive browser capabilities.

Attack Architecture and Capabilities

The extensions operate through a sophisticated remote control mechanism. At their core, they inject full-screen iframes pointing to operator-controlled subdomains of tapnetic.pro, overlaying the user’s current webpage.

IFrame Injection (Source: Layerx Security)

This architecture allows attackers to silently modify functionality and introduce new capabilities without requiring Chrome Web Store updates or triggering user notifications.

The malicious code extracts readable content from active browser tabs using Mozilla’s Readability library, capturing titles, text, excerpts, and metadata from any page users visit, including sensitive internal or authenticated pages.

Malicious Extensions List

Extension IDExtension NameInstalls
nlhpidbjmmffhoogcennoiopekbiglbpAI Assistant50,000 ​
fppbiomdkfbhgjjdmojlogeceejinadgGemini AI Sidebar80,000 ​
gghdfkafnhfpaooiolhncejnlgglhkheAI Sidebar50,000 ​
acaeafediijmccnjlokgcdiojiljfpbeChatGPT Translate30,000 ​
kblengdlefjpjkekanpoidgoghdngdglAI GPT20,000 ​
llojfncgbabajmdglnkbhmiebiinohekChatGPT Sidebar10,000 ​
djhjckkfgancelbmgcamjimgphaphjdlAI Sidebar9,000 ​
fdlagfnfaheppaigholhoojabfaapnhbGoogle Gemini7,000 ​
pgfibniplgcnccdnkhblpmmlfodijppgChatGBT1,000 ​
gnaekhndaddbimfllbgmecjijbbfpabcAsk Gemini1,000 ​
idhknpoceajhnjokpnbicildeoligdghChatGPT Translation1,000 ​
fpmkabpaklbhbhegegapfkenkmpipickChat GPT for Gmail1,000 ​
gohgeedemmaohocbaccllpkabadoogplDeepSeek Chat1,000 ​
fnjinbdmidgjkpmlihcginjipjaoapolEmail Generator AI881 ​
ecikmpoikkcelnakpgaeplcjoickgacjAi Picture Generator813 ​
ebmmjmakencgmgoijdfnbailknaaiffhChat With Gemini760 ​

This information flows directly to third-party servers outside user control. Additionally, the extensions implement voice recognition capabilities using the Web Speech API, enabling transcript collection when triggered remotely.

A particularly dangerous subset of 15 extensions specifically targets Gmail users. These variants inject dedicated content scripts that run at document start on mail.google.com, maintaining persistence through MutationObserver and periodic polling mechanisms.

Tapnetic.pro subdomains – VirusTotal.com (Source: LayerxSecurity)
Tapnetic.pro subdomains – VirusTotal.com (Source: LayerxSecurity)

They extract visible email content directly from Gmail’s DOM, including message threads and draft text, transmitting this data to external infrastructure beyond Gmail’s security boundary.

Campaign Tactics and Evasion

The operation employs “extension spraying” tactics to evade detection and takedowns. When one extension is removed, others remain available or are quickly republished under new identities.

Layerx Security Researchers observed this behavior directly when extension fppbiomdkfbhgjjdmojlogeceejinadg was removed on February 6, 2025, only to be republished under a new ID (gghdfkafnhfpaooiolhncejnlgglhkhe) on February 20, 2025, with identical code and infrastructure.

The tapnetic.pro domain presents a legitimate-appearing website with generic marketing content, though no actual features or services function.

This provides cover infrastructure lending credibility while real malicious activity occurs through extension-controlled subdomains.

Each extension communicates with dedicated subdomains themed to match impersonated AI products, providing logical separation and easier rotation if individual backends are blocked.

Security experts warn that these extensions fundamentally break the browser security model by transforming into general-purpose access brokers capable of harvesting data, monitoring behavior, and evolving silently.

As generative AI popularity continues growing, defenders should expect similar campaigns to proliferate and treat extensions delegating core functionality to remote infrastructure as potential surveillance platforms rather than productivity tools.

Infrastructure IOCs

Indicator TypeValue
C&C Domaintapnetic[.]pro ​
C&C Domainonlineapp[.]pro ​
Subdomainclaude.tapnetic.pro ​
Subdomainchatgpt.tapnetic.pro ​
Subdomaingemini.tapnetic.pro ​

Attack Techniques (MITRE ATT&CK)

TacticTechnique
Resource DevelopmentLX2.003(T1583) – Acquire Infrastructure ​
Initial AccessLX3.004 (T1189) – Drive-by Compromise ​
Initial AccessLX3.003 (T1199) – Trusted Relationship ​
ExecutionLX4.003 – Script Execution ​
Defense EvasionLX7.011 (T1036) – Masquerading ​
Credential AccessLX8.007(T1557) – Adversary-in-the-Middle ​
CollectionLX10.012 – Web Communication Data Collection ​
CollectionLX10.005 – Collect User’s Information ​
Command and ControlLX11.004 – Establish Network Connection ​
Command and ControlLX11.005 – Web Service-Based C2 ​
ExfiltrationLX12.001 – Data Exfiltration ​

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google



Source link