Malicious AI Chrome Extensions Steal Chats

Over 900,000 Chrome users have fallen victim to a sophisticated malware campaign involving two fake AI productivity extensions that impersonate legitimate tools like AITOPIA. Discovered by OX Security researchers in late December 2025, the malicious add-ons — one of which earned Google’s coveted “Featured” badge — secretly exfiltrate complete ChatGPT and DeepSeek conversations, including user prompts, AI responses, and metadata, along with full browsing histories and open tab URLs. Data is Base64-encoded and sent to attacker-controlled servers (e.g., deepaichats[.]com, chatsaigpt[.]com) every 30 minutes via the chrome.tabs.onUpdated API, highlighting the dangerous rise of “prompt poaching” in browser-based AI tools as of January 10, 2026

Key Details of the Campaign

The malicious extensions were designed to mimic the legitimate AITOPIA tool, which provides a convenient sidebar for interacting with multiple LLMs directly within web pages. By replicating this interface, the attackers evaded initial suspicion while embedding data-stealing capabilities.

The two identified extensions include:

  • Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI — Previously awarded Google’s “Featured” badge, granting it heightened visibility and trust. Extension ID: fnmihdojmnkclgjpcoonokmkhjpjechg.
  • AI Sidebar with Deepseek, ChatGPT, Claude and more — Extension ID: inhcgfpbfdjbjogdfjbclgolkmhnooop.

Both extensions deceived users by prompting for consent to collect “anonymous, non-identifiable analytics data,” a seemingly innocuous request that masked the exfiltration of full conversation content from ChatGPT and DeepSeek sessions.

The malware operates by monitoring browser tabs (via chrome.tabs.onUpdated API), generating a unique identifier per victim, scraping DOM elements on targeted sites (chatgpt.com or deepseek.com), storing data locally, Base64-encoding it, and transmitting batches to remote command-and-control (C2) servers every 30 minutes. Attackers further anonymized their infrastructure by abusing platforms like Lovable for hosting privacy policies and other components.

Why This Threat Matters

Stolen data poses significant risks, particularly in enterprise environments:

  • Proprietary source code, business strategies, legal discussions, and personally identifiable information shared in AI chats.
  • Browsing logs revealing internal corporate URLs, session tokens, search habits, and organizational structures—valuable for targeted phishing, espionage, or identity theft.
  • Potential sale of exfiltrated data on dark web markets.

This incident aligns with the emerging trend of “prompt poaching,” where adversaries exploit browser extensions to capture AI interactions, bypassing traditional endpoint protections.

What This Means for SMBs

For small and medium-sized businesses (SMBs), this campaign represents a low-barrier, high-impact supply-chain risk. Employees often install productivity extensions on work devices without centralized vetting, inadvertently creating backdoors for data exfiltration. Unlike traditional malware, these threats evade many endpoint detection tools by operating within trusted browser processes.

SMBs should view browser extensions as part of the extended attack surface—similar to SaaS apps or third-party scripts. The presence of a Google “Featured” badge or high install counts no longer guarantees safety, as seen here. Proactive extension management can prevent intellectual property leakage, compliance violations (e.g., GDPR, CCPA), and downstream attacks like credential stuffing or spear-phishing based on stolen chat context.

Technical Indicators (IOCs)

The following Indicators of Compromise (IOCs) can help security teams detect and respond to this campaign:

  • Extension IDs:
    • fnmihdojmnkclgjpcoonokmkhjpjechg (Chat GPT for Chrome variant)
    • inhcgfpbfdjbjogdfjbclgolkmhnooop (AI Sidebar variant)
  • Known C2 Domains/Endpoints:
    • deepaichats[.]com
    • chatsaigpt[.]com
  • Behavioral Indicators:
    • These IOCs, derived from OX Security’s analysis, enable integration into SIEM rules, network monitoring, or browser policy blocks.

Mitigation Recommendations

Organizations and individual users should take immediate action:

  • Audit installed extensions by navigating to chrome://extensions/ and removing any unfamiliar or suspicious AI-related add-ons, especially those matching the IDs above.
  • Limit extension permissions and prefer official apps or dedicated clients for sensitive AI usage.
  • Regularly review Chrome Web Store listings, noting that even “Featured” badges do not guarantee safety.
  • Implement browser security policies, extension vetting processes, and monitoring for anomalous outbound traffic in enterprise settings.
  • Report suspicious extensions directly to Google for removal.

The campaign, reported to Google on December 29, 2025, highlights the need for heightened vigilance as AI tools integrate deeper into daily workflows. While the extensions have since faced restrictions (with one losing its Featured status), the incident serves as a reminder that supply-chain compromises in the browser ecosystem remain a persistent challenge.

“Browser extensions remain one of the most under-monitored parts of the modern attack surface, often granted excessive permissions that enable stealthy, persistent data exfiltration — especially when tied to high-value AI workflows.” OX Security research team, December 2025 analysis

Source and full details

https://www.ox.security/blog/malicious-chrome-extensions-steal-chatgpt-deepseek-conversations

CISA STATUS 1505 ACTIVE EXPLOITS
● VIEW RECENT THREATS
Latest (10) KEVs
CVE-2021-39935 Added: Feb 03, 2026
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
CVE-2025-64328 Added: Feb 03, 2026
Sangoma FreePBX OS Command Injection Vulnerability
CVE-2019-19006 Added: Feb 03, 2026
Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-40551 Added: Feb 03, 2026
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2026-1281 Added: Jan 29, 2026
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
CVE-2026-24858 Added: Jan 27, 2026
Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2018-14634 Added: Jan 26, 2026
Linux Kernel Integer Overflow Vulnerability
CVE-2025-52691 Added: Jan 26, 2026
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
CVE-2026-23760 Added: Jan 26, 2026
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2026-24061 Added: Jan 26, 2026
GNU InetUtils Argument Injection Vulnerability
THREAT #1 CVE-2024-27198 94.58% SCORE
● VIEW DETAILED TOP 10
Global Intelligence
RANK #1 CVE-2024-27198 Score: 94.58% JetBrains TeamCity Authentication Bypass Vulnerability
RANK #2 CVE-2023-23752 Score: 94.52% Joomla! Improper Access Control Vulnerability
RANK #3 CVE-2017-1000353 Score: 94.51% Jenkins Remote Code Execution Vulnerability
RANK #4 CVE-2017-8917 Score: 94.50%
Known Security Vulnerability
RANK #5 CVE-2016-10033 Score: 94.49% PHPMailer Command Injection Vulnerability
RANK #6 CVE-2018-7600 Score: 94.49% Drupal Core Remote Code Execution Vulnerability
RANK #10 CVE-2018-13379 Score: 94.48% Fortinet FortiOS SSL VPN Path Traversal Vulnerability
GLOBAL THREAT GREEN Condition Level
VIEW THREAT REPORT
Threat Intelligence
Source: SANS ISC Report ↗ The InfoCon is a status system used by the SANS Internet Storm Center to track global internet threat levels.

Malicious AI Chrome Extensions Steal Chats

Over 900,000 Chrome users have fallen victim to a sophisticated malware campaign involving two fake AI productivity extensions that impersonate legitimate tools like AITOPIA. Discovered by OX Security researchers in late December 2025, the malicious add-ons — one of which earned Google’s coveted “Featured” badge — secretly exfiltrate complete ChatGPT and DeepSeek conversations, including user prompts, AI responses, and metadata, along with full browsing histories and open tab URLs. Data is Base64-encoded and sent to attacker-controlled servers (e.g., deepaichats[.]com, chatsaigpt[.]com) every 30 minutes via the chrome.tabs.onUpdated API, highlighting the dangerous rise of “prompt poaching” in browser-based AI tools as of January 10, 2026

Key Details of the Campaign

The malicious extensions were designed to mimic the legitimate AITOPIA tool, which provides a convenient sidebar for interacting with multiple LLMs directly within web pages. By replicating this interface, the attackers evaded initial suspicion while embedding data-stealing capabilities.

The two identified extensions include:

  • Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI — Previously awarded Google’s “Featured” badge, granting it heightened visibility and trust. Extension ID: fnmihdojmnkclgjpcoonokmkhjpjechg.
  • AI Sidebar with Deepseek, ChatGPT, Claude and more — Extension ID: inhcgfpbfdjbjogdfjbclgolkmhnooop.

Both extensions deceived users by prompting for consent to collect “anonymous, non-identifiable analytics data,” a seemingly innocuous request that masked the exfiltration of full conversation content from ChatGPT and DeepSeek sessions.

The malware operates by monitoring browser tabs (via chrome.tabs.onUpdated API), generating a unique identifier per victim, scraping DOM elements on targeted sites (chatgpt.com or deepseek.com), storing data locally, Base64-encoding it, and transmitting batches to remote command-and-control (C2) servers every 30 minutes. Attackers further anonymized their infrastructure by abusing platforms like Lovable for hosting privacy policies and other components.

Why This Threat Matters

Stolen data poses significant risks, particularly in enterprise environments:

  • Proprietary source code, business strategies, legal discussions, and personally identifiable information shared in AI chats.
  • Browsing logs revealing internal corporate URLs, session tokens, search habits, and organizational structures—valuable for targeted phishing, espionage, or identity theft.
  • Potential sale of exfiltrated data on dark web markets.

This incident aligns with the emerging trend of “prompt poaching,” where adversaries exploit browser extensions to capture AI interactions, bypassing traditional endpoint protections.

What This Means for SMBs

For small and medium-sized businesses (SMBs), this campaign represents a low-barrier, high-impact supply-chain risk. Employees often install productivity extensions on work devices without centralized vetting, inadvertently creating backdoors for data exfiltration. Unlike traditional malware, these threats evade many endpoint detection tools by operating within trusted browser processes.

SMBs should view browser extensions as part of the extended attack surface—similar to SaaS apps or third-party scripts. The presence of a Google “Featured” badge or high install counts no longer guarantees safety, as seen here. Proactive extension management can prevent intellectual property leakage, compliance violations (e.g., GDPR, CCPA), and downstream attacks like credential stuffing or spear-phishing based on stolen chat context.

Technical Indicators (IOCs)

The following Indicators of Compromise (IOCs) can help security teams detect and respond to this campaign:

  • Extension IDs:
    • fnmihdojmnkclgjpcoonokmkhjpjechg (Chat GPT for Chrome variant)
    • inhcgfpbfdjbjogdfjbclgolkmhnooop (AI Sidebar variant)
  • Known C2 Domains/Endpoints:
    • deepaichats[.]com
    • chatsaigpt[.]com
  • Behavioral Indicators:
    • These IOCs, derived from OX Security’s analysis, enable integration into SIEM rules, network monitoring, or browser policy blocks.

Mitigation Recommendations

Organizations and individual users should take immediate action:

  • Audit installed extensions by navigating to chrome://extensions/ and removing any unfamiliar or suspicious AI-related add-ons, especially those matching the IDs above.
  • Limit extension permissions and prefer official apps or dedicated clients for sensitive AI usage.
  • Regularly review Chrome Web Store listings, noting that even “Featured” badges do not guarantee safety.
  • Implement browser security policies, extension vetting processes, and monitoring for anomalous outbound traffic in enterprise settings.
  • Report suspicious extensions directly to Google for removal.

The campaign, reported to Google on December 29, 2025, highlights the need for heightened vigilance as AI tools integrate deeper into daily workflows. While the extensions have since faced restrictions (with one losing its Featured status), the incident serves as a reminder that supply-chain compromises in the browser ecosystem remain a persistent challenge.

“Browser extensions remain one of the most under-monitored parts of the modern attack surface, often granted excessive permissions that enable stealthy, persistent data exfiltration — especially when tied to high-value AI workflows.” OX Security research team, December 2025 analysis

Source and full details

https://www.ox.security/blog/malicious-chrome-extensions-steal-chatgpt-deepseek-conversations

Follow us on
© 2026 ByteVanguard • Independent Cyber Threat Intelligence