Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Fake AI Chrome extensions with 300K users steal credentials, emails
    Cybersecurity

    Fake AI Chrome extensions with 300K users steal credentials, emails

    adminBy adminFebruary 12, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Fake AI Chrome extensions with 300K users steal credentials, emails
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Fake AI Chrome extensions with 300K users steal credentials, emails

    A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information.

    Some of the extensions are still present in the Chrome Web Store and have been installed by tens of thousands of users, while others show a small install count.

    Researchers at browser security platform LayerX discovered the malicious extension campaign and named it AiFrame. They found that all analyzed extensions are part of the same malicious effort as they communicate with infrastructure under a single domain, tapnetic[.]pro.

    Wiz

    According to them, the most popular extension in the AiFrame campaign had 80,000 users and was called Gemini AI Sidebar (fppbiomdkfbhgjjdmojlogeceejinadg), but it is no longer on the Chrome Web Store.

    However, BleepingComputer found that other extensions with thousands of users are still present on Google’s repository for Chrome extensions. It should be noted that the names may be different in some cases, but the identification is the same.

    1. AI Sidebar (gghdfkafnhfpaooiolhncejnlgglhkhe) – 70,000 users
    2. AI Assistant (nlhpidbjmmffhoogcennoiopekbiglbp) – 60,000 users
    3. ChatGPT Translate (acaeafediijmccnjlokgcdiojiljfpbe) – 30,000 users
    4. AI GPT (kblengdlefjpjkekanpoidgoghdngdgl) – 20,000 users
    5. ChatGPT (llojfncgbabajmdglnkbhmiebiinohek) – 20,000 users
    6. AI Sidebar (djhjckkfgancelbmgcamjimgphaphjdl) – 10,000 users
    7. Google Gemini (fdlagfnfaheppaigholhoojabfaapnhb) – 10,000 users

    LayerX found that all 30 extensions share the same internal structure, JavaScript logic, permissions, and backend infrastructure.

    The malicious browser add-ons do not implement AI functionality locally; instead, they deliver the promised feature by rendering a full-screen iframe to load content from a remote domain.

    This, by itself, is risky, as publishers can change the extensions’ logic at any time without pushing an update – just like in the case of Microsoft Office Add-ins – thus avoiding a new review.

    In the background, the extensions extract page content from websites the user visits, including sensitive authentication pages, using Mozilla’s Readability library.

    LayerX says that a subset of 15 extensions specifically targets Gmail data, using a dedicated content script that runs at ‘document_start’ on ‘mail.google.com’ and injects UI elements.

    The script reads visible email content directly from the DOM and repeatedly extracts email thread text via ‘.textContent.’ The researchers note that even email drafts can be captured.

    “When Gmail-related features such as AI-assisted replies or summaries are invoked, the extracted email content is passed into the extension’s logic and transmitted to third-party backend infrastructure controlled by the extension operator,” LayerX explains in a report today.

    “As a result, email message text and related contextual data may be sent off-device, outside of Gmail’s security boundary, to remote servers.”

    The extensions also feature a remotely triggered voice recognition and transcript generation mechanism using the ‘Web Speech API,’ returning the results to the operators. Depending on the granted permissions, the extensions may even siphon conversations from the victim’s environment.

    BleepingComputer has contacted Google for a comment on LayerX findings, but we have not received a response by publication time.

    It is recommended to check LayerX’s list of indicators of compromise for the complete set of malicious extensions. If compromise is confirmed, users should reset passwords for all accounts.


    tines

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    300K Chrome Credentials emails Extensions Fake steal Users
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article5 “pro” tools that turn Windows from a toy into a powerhouse
    Next Article Build Your Own Branded Mobile App
    admin
    • Website

    Related Posts

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    March 5, 2026

    Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    What SMEC’s Data Reveals About AI Max Performance

    March 5, 2026

    This Ultra phone first to use Sony’s new 200MP camera sensor

    March 5, 2026

    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (622)
    • Privacy & Online Earning (92)
    • SEO & Digital Marketing (395)
    • Tech Tools & Mobile / Apps (759)
    • WiFi / Internet & Networking (111)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    What SMEC’s Data Reveals About AI Max Performance

    March 5, 2026

    This Ultra phone first to use Sony’s new 200MP camera sensor

    March 5, 2026
    Most Popular
    • Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
    • What SMEC’s Data Reveals About AI Max Performance
    • This Ultra phone first to use Sony’s new 200MP camera sensor
    • Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
    • Yep, Amazon Is Down | Lifehacker
    • Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud
    • AI Max increases revenue 13% but drives higher CPA: Study
    • Why everyone should use VS Code (even if they aren’t programmers)
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.