3 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
A long-running campaign by a group called ShadyPanda has infected 4.3 million users of Chrome and Edge with spyware hidden in legitimate-looking browser extensions. Some of these extensions, still available on the Edge store, allow attackers to track user behavior and steal sensitive data. Researchers warn that the infrastructure for attacks remains active even after the extensions have been removed.
If you do, here's more
A long-running campaign by a group identified as ShadyPanda has infected over 4.3 million users of Google Chrome and Microsoft Edge through malicious browser extensions. These extensions initially appeared legitimate, accumulating millions of downloads before being updated with malware that operates backdoors and spyware. Five extensions, with more than 4 million installs, remain active in the Microsoft Edge store, allowing for extensive surveillance and data theft.
The malware can execute arbitrary JavaScript, inject malicious content into websites, and send detailed user data—such as browsing history and fingerprints—to servers in China. One notable extension, Clean Master, was downloaded over 300,000 times before its malicious update spread the backdoor to users. Koi researchers noted that another active extension, WeTab, masquerades as a productivity tool while tracking extensive user data and sending it to multiple domains, including Baidu servers.
ShadyPanda also conducted previous campaigns, disguising extensions as wallpaper or productivity apps to monetize user browsing data through affiliate tracking. Another campaign involved a tool that hijacked searches and logged keystrokes. These incidents highlight significant gaps in how browser marketplaces monitor extensions after their initial approval, allowing malicious actors to exploit trusted tools over an extended period. After the article's publication, Microsoft confirmed the removal of all identified malicious extensions from its Edge Add-on store.
Questions about this article
No questions yet.