Malicious Browser Extensions Spy on 4.3 Million Users Before Removal

12 December 2025 Technology

WASHINGTON, D.C. — Over the course of several years, a sophisticated malware operation known as ShadyPanda covertly transformed seemingly benign browser extensions into powerful spyware, compromising the privacy of approximately 4.3 million users. The malicious extensions, which initially appeared as harmless wallpaper or productivity tools on Google Chrome and Microsoft Edge, were quietly updated with hidden surveillance capabilities that harvested sensitive personal data without user consent.

According to a detailed investigation by Koi Security, the ShadyPanda campaign began as early as 2018, with extensions distributed through the official Chrome Web Store and Microsoft Edge Add-ons store. These extensions operated normally for years, building user trust before receiving staged auto-updates that injected malicious code. These updates were silently deployed through each browser’s trusted auto-update system, requiring no user interaction such as clicking or responding to phishing attempts.

The spyware collected a wide range of data, including browsing histories, search queries, cookies, keystrokes, and even mouse movements. It also gathered fingerprinting data and accessed local storage, enabling attackers to create detailed user profiles. Beyond passive data collection, the extensions hijacked web searches, redirected queries, and injected tracking codes into legitimate links to generate illicit revenue.

More alarmingly, ShadyPanda pushed backdoor updates that granted attackers remote code execution privileges on an hourly basis. This allowed full browser control, enabling real-time monitoring of websites visited and exfiltration of persistent identifiers. Researchers also uncovered capabilities for adversary-in-the-middle attacks, which could steal credentials, hijack sessions, and inject malicious code into any website visited by the user.

To evade detection, the extensions switched to a harmless mode when users opened developer tools, masking their malicious behavior. The stealth and sophistication of the operation allowed it to persist undetected for years.

Following the exposure of the ShadyPanda campaign, Google removed all identified malicious extensions from the Chrome Web Store. A Google spokesperson confirmed that none of the compromised extensions remain active on their platform. Similarly, Microsoft has purged the malicious extensions from the Edge Add-ons store, with a company representative affirming their commitment to removing any add-ons that violate store policies.

The Federal Trade Commission (FTC) has previously warned consumers about the risks posed by malicious browser extensions and recommends vigilance when installing add-ons, especially those requesting extensive permissions. Users are encouraged to regularly review installed extensions and remove any that seem suspicious or unnecessary. The FTC’s consumer alerts provide guidance on identifying and mitigating such threats.

Cybersecurity experts emphasize that the ShadyPanda incident highlights the growing danger of supply-chain attacks targeting trusted software platforms. The Cybersecurity and Infrastructure Security Agency (CISA) advises organizations and individuals to implement multi-layered security measures, including endpoint protection and network monitoring, to detect and respond to such sophisticated threats.

As browser extensions continue to offer convenience and enhanced functionality, this episode serves as a stark reminder of the potential risks lurking behind seemingly innocuous software. Users should remain cautious, keep their software updated, and rely on official sources for security information to protect their digital privacy.

BREAKING NEWS
Never miss a breaking news alert!
Written By
Maya Chen reports on international politics, conflict and diplomacy. She specializes in explaining how global events shape U.S. security, trade and migration, and how decisions made abroad ripple into life at home.
View Full Bio & Articles →

Leave a Reply