Surge in Malicious Chrome Extensions Targets AI Users and Enterprises

Indeed, security researchers have recently discovered a quickly emerging menace from hijacked browser extensions. This problem is particularly acute with AI-related extensions. AI tools are already being integrated into enterprise workflows. In the interim, criminals are taking advantage of the general trust associated with well-known names in AI to get users to install malicious extensions…

Tina Reynolds Avatar

By

Surge in Malicious Chrome Extensions Targets AI Users and Enterprises

Indeed, security researchers have recently discovered a quickly emerging menace from hijacked browser extensions. This problem is particularly acute with AI-related extensions. AI tools are already being integrated into enterprise workflows. In the interim, criminals are taking advantage of the general trust associated with well-known names in AI to get users to install malicious extensions on browsers. These malicious extensions changed all of the extensions’ affiliate links and intercepted authentication tokens from webapps, such as ChatGPT. This concerning development has the center’s leadership worried—as well as the cybersecurity community at large.

The seriousness of this threat was underscored earlier this month when a major source for these bad Chrome extensions disappeared. This occurred shortly after the public disclosure occurred on January 27, 2026. According to reporting, the extensions had been downloaded almost 900 times. They’re probably all just part of a coordinated play campaign, with shared source code, identical icons, branding, and descriptions spread across multiple add-ons.

Overview of Malicious Extensions

Among the malicious extensions identified, the Amazon Ads Blocker (ID: pnpchphmplpdimbllknjoiopmfphellj) masquerades as a tool aimed at enhancing user experience by blocking sponsored content on Amazon. It has a much more insidious role.

“The extension does block ads as advertised, but its primary function is hidden: it automatically injects the developer’s affiliate tag (10xprofit-20) into every Amazon product link and replaces existing affiliate codes from content creators.” – Kush Pandya

This method of covert affiliate hijacking deceives consumers. It further siphons away would-be revenue from independent creators to the makers of the extension. Another example is the Amazon ASIN Lookup 10xprofit (ID: ljcgnobemekghgobhlplpehijemdgcgo), which operates under similar pretenses.

Plus, many extensions aimed at AliExpress take advantage of an artificial urgency. They show fake “LIMITED TIME DEAL” countdown timers on product pages to scare shoppers into snapping up items quickly.

Technical Mechanisms and Implications

The tricky extensions use a number of technical tactics to carry out their plans. They then scrape this product data and send it out to a remote domain listed as “app.10xprofit.io.” We still are not finished, though. Such practices not only violate user privacy but threaten their economic prosperity as well.

Arguably the most concerning feature of these extensions is the ability to intercept ChatGPT authentication tokens and steal them. By injecting content scripts through the chatgpt.com website, attackers can obtain arbitrary account-level access.

“Possession of such tokens provides account-level access equivalent to that of the user, including access to conversation history and metadata.” – Natalie Zargarov

This means that attackers can replicate users’ access credentials to ChatGPT and impersonate them, allowing them to view all conversations, data, or code associated with the user’s account.

The Broader Context of Cybersecurity Risks

This increase in bad browser extensions is part of a larger trend in the ongoing cybersecurity landscape. Enterprises are moving quickly to implement Bring Your Own Device (BYOD) policies. At the same time, they’re adopting Software as a Service (SaaS) solutions, with the browser as a first endpoint for most users. This dramatic shift has caught the attention of cybercriminals.

“BYOD policies, SaaS-first environments, and remote work have made the browser the new endpoint. Attackers have noticed. Malicious browser extensions are now a primary attack vector.” – Daniel Kelley

These extensions now represent an immediate and direct danger to users. Their newfound popularity serves as a wake-up call that all users should be careful when installing any browser add-ons. Security specialists recommend users be particularly cautious of extensions that claim to offer a variety of tools. This is particularly troubling when those extensions come bundled with ad blocking or price comparison functions.

“Extensions that combine unrelated functionality (ad blocking, price comparison, coupon finding) with affiliate injection should be treated as high-risk, particularly those with disclosures that don’t match the actual code behavior.” – Socket

The importance of transparency cannot be overstated. A large number of these harmful extensions obfuscate their purpose through deceptive and ambiguous descriptions that fail to disclose what they actually do.

“This mismatch between disclosure and implementation creates false consent.” – Kush Pandya