900K Chrome Users Had Their AI Chats Stolen by Fake Extensions

900K Chrome Users Had Their AI Chats Stolen by Fake Extensions - Professional coverage

According to TechRepublic, security researchers at OX Security uncovered a massive campaign where malicious Chrome extensions stole sensitive AI conversations from roughly 900,000 users. The extensions, which posed as legitimate productivity tools, specifically targeted sessions on ChatGPT and DeepSeek. They operated by tricking users into granting permission to collect “anonymous analytics,” but instead siphoned off complete chat logs, user prompts, and AI-generated responses. The malware used standard browser APIs to monitor tab activity and scrape data directly from the webpage. Stolen information, tagged with unique user IDs, was then batched and sent to attacker-controlled servers every 30 minutes. This breach highlights a significant, under-the-radar threat within the trusted browser extension ecosystem.

Special Offer Banner

The Simple Permissions Trick

Here’s the thing that’s so frustrating about this: there was no fancy hack. The attackers didn’t need a zero-day exploit or to break encryption. They just asked nicely. By requesting overly broad permissions—often disguised in vague, reassuring language about “analytics”—they got the keys to the kingdom. Once installed, an extension using the `chrome.tabs.onUpdated` API can basically see everything you do in your browser. It’s a feature, not a bug, designed for legitimate tools. But in this case, it became a perfect surveillance tool, waiting silently for you to open a ChatGPT tab and then vacuuming up your entire conversation. It’s a stark reminder that the permission prompt is your last, and often weakest, line of defense.

Why This Is a Big Deal for Businesses

So, why should an enterprise care if an employee’s ChatGPT chat about recipe ideas gets stolen? Well, that’s probably not what’s being stolen. Think about it: employees are using these AI tools for work. They’re pasting proprietary code, discussing unreleased product strategies, summarizing sensitive financial reports, or cleaning up datasets containing customer information. This campaign wasn’t just stealing chats; it was also harvesting the URLs of every open tab. That means attackers could see if a user had internal dashboards, CRM systems, or cloud admin consoles open. They’re not just building a profile of your AI usage; they’re building a blueprint of your corporate internal web. The potential for intellectual property theft and corporate espionage here is enormous, and it happened without a single network intrusion.

The Impossible Extension Security Problem

And this leads to the core dilemma: how do you secure this? The Chrome Web Store has vetting, but it’s clearly not foolproof. These extensions looked legit enough to pass initial checks and get 900,000 installs. For IT departments, it’s a nightmare. You can’t just ban all extensions—productivity would tank. But allowing them creates a massive, unmanaged attack surface. The OX Security blog post recommends strict allowlisting and using enterprise browser management tools, which is good advice. But in practice, that’s a heavy lift for many organizations. It’s a constant cat-and-mouse game where the mouse has a direct pipeline to your most sensitive data conversations.

Shifting From Cleanup to Prevention

Look, the reactive steps are clear: audit installed extensions, look for the malicious IDs, and clean up. But the real lesson is about proactive control. This means treating browser extensions with the same seriousness as any other enterprise software. Enforce installation policies. Use data loss prevention (DLP) tools to flag when sensitive data is being typed into a web-based AI tool. And maybe most importantly, train users. They need to understand that a browser extension asking for permission to “read and change site data on all websites” is a huge red flag, no matter how useful the tool promises to be. In an age where AI is woven into daily work, the browser tab is the new frontier for data theft. We can’t afford to leave it unguarded.

Leave a Reply

Your email address will not be published. Required fields are marked *