GhostPoster Campaign: 17 New Malicious Browser Extensions

A sophisticated malware campaign known as GhostPoster has expanded significantly, with security researchers uncovering 17 additional malicious browser extensions across Chrome, Edge, and Firefox stores. These extensions, which have amassed more than 840,000 installs in total, masquerade as legitimate productivity tools (HR dashboards, ERP integrations, VPNs) but quietly steal sensitive data from users’ browsing sessions.

Discovered initially by Koi Security in late December 2025, the campaign uses steganography (hidden code embedded in PNG images) to deliver multi-stage payloads. LayerX Security traced the same infrastructure and TTPs to the new extensions, revealing a long-running operation that has evaded detection for up to five years in some cases.

The malicious extensions request broad permissions under the guise of “anonymous, non-identifiable analytics data.” Once installed, they monitor tabs, scrape chat interfaces (ChatGPT, DeepSeek, Claude), local storage, browsing history, and URLs, encode everything in Base64, and exfiltrate it in batches every 30 minutes to attacker-controlled domains such as deepaichats[.]com and chatsaigpt[.]com. This “prompt poaching” tactic is becoming a growing concern in early 2026 as AI workflows become more valuable targets.

Key Details of the Campaign

The GhostPoster extensions impersonate popular AI sidebar tools and productivity helpers. LayerX identified the following new extensions tied to the same C2 infrastructure:

  • “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” (Chrome/Edge extension ID: fnmihdojmnkclgjpcoonokmkhjpjechg) Previously marked as “Featured” by Google before being restricted.
  • “AI Sidebar with Deepseek, ChatGPT, Claude and more” (extension ID: inhcgfpbfdjbjogdfjbclgolkmhnooop)
  • Plus 15 others across Firefox and Edge stores (full list and IDs available in the LayerX report).

Attackers use modular payloads for persistence, reconnaissance, credential theft, affiliate hijacking, click fraud, and session hijacking. The campaign originated on Microsoft Edge, then spread to Firefox and Chrome. Many extensions remained dormant for years before activating malicious updates, making detection extremely difficult.

Why This Threat Matters

Browser extensions remain one of the most under-monitored parts of the modern attack surface. They are granted excessive permissions that enable stealthy, persistent data exfiltration — especially when tied to high-value AI workflows.

Stolen data includes proprietary prompts, strategic business information, PII embedded in chats, browsing logs for phishing profiling, and session tokens for account takeover. This aligns with the rising prompt poaching trend, where attackers target AI interaction history to harvest intellectual property, competitive intelligence, or personal data.

What This Means for SMBs

Small and medium-sized businesses are particularly vulnerable. Employees often install these tools without IT vetting, bypassing corporate security controls. The extensions evade traditional antivirus by mimicking legitimate behavior and using encrypted exfiltration. This expands the attack surface far beyond email or SaaS — a single compromised extension can expose trade secrets, client data, or compliance violations (GDPR, CCPA, PIPEDA). Organizations relying on “Featured” badges in extension stores are at higher risk, as the badge is not a security guarantee.

Technical Indicators (IOCs)

The GhostPoster campaign relies on several detectable artifacts and behaviors. Key indicators include the presence of the delimiter [62,62,62,62] (ASCII ‘>>>>’) embedded within the PNG icon files of infected extensions, used to extract hidden payloads via steganography. Malicious scripts are stored in chrome.storage.local under the key instlogo, with delayed execution (48+ hours) before contacting remote configuration servers. Payloads are retrieved using Base64-encoded data, custom character case swapping, digit alteration (8/9), and XOR operations keyed to the extension’s runtime ID. Network traffic shows periodic outbound requests (every ~30 minutes) to attacker-controlled domains for config updates and exfiltration of scraped chat content, browsing history, and session tokens. Behavioral signs include broad permission requests (“tabs”, “storage”, “webNavigation”), unusual DOM scraping on AI chat sites (chat.openai.com, claude.ai, deepseek.com), and injection of tracking scripts or affiliate redirects. These IOCs should be integrated into SIEM rules, browser policy monitoring, and extension audits for early detection.

Mitigation Recommendations

  • Audit all installed extensions immediately via chrome://extensions/ (Chrome/Edge) or about:addons (Firefox). Remove any matching IDs or suspicious productivity/AI tools.
  • Limit extension permissions and disable auto-updates where possible.
  • Prefer official apps or verified sources over third-party browser extensions.
  • Review store listings carefully — “Featured” badges are not security endorsements.
  • Implement enterprise policies: extension allowlisting, regular audits, and monitoring for anomalous outbound traffic.
  • Report suspicious extensions to Google, Microsoft, and Mozilla stores.
  • Educate users: never install AI sidebar tools from unknown developers.

The campaign was first exposed in late December 2025. Since LayerX’s report, some extensions have been restricted or removed, but many remain active. Vigilance in AI-driven workflows remains essential.

“Browser extensions remain one of the most under-monitored parts of the modern attack surface, often granted excessive permissions that enable stealthy, persistent data exfiltration — especially when tied to high-value AI workflows.” LayerX Security research team, January 2026 analysis

Source and full details:

Read the original LayerX report

CISA STATUS 1505 ACTIVE EXPLOITS
● VIEW RECENT THREATS
Latest (10) KEVs
CVE-2021-39935 Added: Feb 03, 2026
GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
CVE-2025-64328 Added: Feb 03, 2026
Sangoma FreePBX OS Command Injection Vulnerability
CVE-2019-19006 Added: Feb 03, 2026
Sangoma FreePBX Improper Authentication Vulnerability
CVE-2025-40551 Added: Feb 03, 2026
SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
CVE-2026-1281 Added: Jan 29, 2026
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
CVE-2026-24858 Added: Jan 27, 2026
Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2018-14634 Added: Jan 26, 2026
Linux Kernel Integer Overflow Vulnerability
CVE-2025-52691 Added: Jan 26, 2026
SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
CVE-2026-23760 Added: Jan 26, 2026
SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
CVE-2026-24061 Added: Jan 26, 2026
GNU InetUtils Argument Injection Vulnerability
THREAT #1 CVE-2024-27198 94.58% SCORE
● VIEW DETAILED TOP 10
Global Intelligence
RANK #1 CVE-2024-27198 Score: 94.58% JetBrains TeamCity Authentication Bypass Vulnerability
RANK #2 CVE-2023-23752 Score: 94.52% Joomla! Improper Access Control Vulnerability
RANK #3 CVE-2017-1000353 Score: 94.51% Jenkins Remote Code Execution Vulnerability
RANK #4 CVE-2017-8917 Score: 94.50%
Known Security Vulnerability
RANK #5 CVE-2024-27199 Score: 94.49%
Known Security Vulnerability
RANK #6 CVE-2018-7600 Score: 94.49% Drupal Core Remote Code Execution Vulnerability
RANK #10 CVE-2018-13379 Score: 94.48% Fortinet FortiOS SSL VPN Path Traversal Vulnerability
GLOBAL THREAT GREEN Condition Level
VIEW THREAT REPORT
Threat Intelligence
Source: SANS ISC Report ↗ The InfoCon is a status system used by the SANS Internet Storm Center to track global internet threat levels.

GhostPoster Campaign: 17 New Malicious Browser Extensions

A sophisticated malware campaign known as GhostPoster has expanded significantly, with security researchers uncovering 17 additional malicious browser extensions across Chrome, Edge, and Firefox stores. These extensions, which have amassed more than 840,000 installs in total, masquerade as legitimate productivity tools (HR dashboards, ERP integrations, VPNs) but quietly steal sensitive data from users’ browsing sessions.

Discovered initially by Koi Security in late December 2025, the campaign uses steganography (hidden code embedded in PNG images) to deliver multi-stage payloads. LayerX Security traced the same infrastructure and TTPs to the new extensions, revealing a long-running operation that has evaded detection for up to five years in some cases.

The malicious extensions request broad permissions under the guise of “anonymous, non-identifiable analytics data.” Once installed, they monitor tabs, scrape chat interfaces (ChatGPT, DeepSeek, Claude), local storage, browsing history, and URLs, encode everything in Base64, and exfiltrate it in batches every 30 minutes to attacker-controlled domains such as deepaichats[.]com and chatsaigpt[.]com. This “prompt poaching” tactic is becoming a growing concern in early 2026 as AI workflows become more valuable targets.

Key Details of the Campaign

The GhostPoster extensions impersonate popular AI sidebar tools and productivity helpers. LayerX identified the following new extensions tied to the same C2 infrastructure:

  • “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” (Chrome/Edge extension ID: fnmihdojmnkclgjpcoonokmkhjpjechg) Previously marked as “Featured” by Google before being restricted.
  • “AI Sidebar with Deepseek, ChatGPT, Claude and more” (extension ID: inhcgfpbfdjbjogdfjbclgolkmhnooop)
  • Plus 15 others across Firefox and Edge stores (full list and IDs available in the LayerX report).

Attackers use modular payloads for persistence, reconnaissance, credential theft, affiliate hijacking, click fraud, and session hijacking. The campaign originated on Microsoft Edge, then spread to Firefox and Chrome. Many extensions remained dormant for years before activating malicious updates, making detection extremely difficult.

Why This Threat Matters

Browser extensions remain one of the most under-monitored parts of the modern attack surface. They are granted excessive permissions that enable stealthy, persistent data exfiltration — especially when tied to high-value AI workflows.

Stolen data includes proprietary prompts, strategic business information, PII embedded in chats, browsing logs for phishing profiling, and session tokens for account takeover. This aligns with the rising prompt poaching trend, where attackers target AI interaction history to harvest intellectual property, competitive intelligence, or personal data.

What This Means for SMBs

Small and medium-sized businesses are particularly vulnerable. Employees often install these tools without IT vetting, bypassing corporate security controls. The extensions evade traditional antivirus by mimicking legitimate behavior and using encrypted exfiltration. This expands the attack surface far beyond email or SaaS — a single compromised extension can expose trade secrets, client data, or compliance violations (GDPR, CCPA, PIPEDA). Organizations relying on “Featured” badges in extension stores are at higher risk, as the badge is not a security guarantee.

Technical Indicators (IOCs)

The GhostPoster campaign relies on several detectable artifacts and behaviors. Key indicators include the presence of the delimiter [62,62,62,62] (ASCII ‘>>>>’) embedded within the PNG icon files of infected extensions, used to extract hidden payloads via steganography. Malicious scripts are stored in chrome.storage.local under the key instlogo, with delayed execution (48+ hours) before contacting remote configuration servers. Payloads are retrieved using Base64-encoded data, custom character case swapping, digit alteration (8/9), and XOR operations keyed to the extension’s runtime ID. Network traffic shows periodic outbound requests (every ~30 minutes) to attacker-controlled domains for config updates and exfiltration of scraped chat content, browsing history, and session tokens. Behavioral signs include broad permission requests (“tabs”, “storage”, “webNavigation”), unusual DOM scraping on AI chat sites (chat.openai.com, claude.ai, deepseek.com), and injection of tracking scripts or affiliate redirects. These IOCs should be integrated into SIEM rules, browser policy monitoring, and extension audits for early detection.

Mitigation Recommendations

  • Audit all installed extensions immediately via chrome://extensions/ (Chrome/Edge) or about:addons (Firefox). Remove any matching IDs or suspicious productivity/AI tools.
  • Limit extension permissions and disable auto-updates where possible.
  • Prefer official apps or verified sources over third-party browser extensions.
  • Review store listings carefully — “Featured” badges are not security endorsements.
  • Implement enterprise policies: extension allowlisting, regular audits, and monitoring for anomalous outbound traffic.
  • Report suspicious extensions to Google, Microsoft, and Mozilla stores.
  • Educate users: never install AI sidebar tools from unknown developers.

The campaign was first exposed in late December 2025. Since LayerX’s report, some extensions have been restricted or removed, but many remain active. Vigilance in AI-driven workflows remains essential.

“Browser extensions remain one of the most under-monitored parts of the modern attack surface, often granted excessive permissions that enable stealthy, persistent data exfiltration — especially when tied to high-value AI workflows.” LayerX Security research team, January 2026 analysis

Source and full details:

Read the original LayerX report

Follow us on
© 2026 ByteVanguard • Independent Cyber Threat Intelligence