<<<<<<< HEAD ======= >>>>>>> aa0e8a6a752f213750c5cecf4c1ff51a29770cf8

Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

News > Attacks & Threats > 260K+ Chrome Users Duped by Fake AI Browser Extensions

260K+ Chrome Users Duped by Fake AI Browser Extensions

30 copycat apps tricked users, and Google itself, into thinking they're legitimate AI tools.

30 copycat apps tricked users, and Google itself, into thinking they're legitimate AI tools.

The Chrome Web Store has been infested with dozens of malicious browser extensions claiming to provide AI assistant functionality but that secretly are siphoning off personal information from victims.

Researchers at LayerX identified 30 Google Chrome extensions that are carbon copies of one another, but for some superficial differences in how they're branded. Many of them are quite popular, with tens of thousands of downloads apiece. They all masquerade as AI assistants — and they do a pretty good job of pretending — but secretly steal email content, browser content, and anything else the user willingly feeds them. More here

Similar Stories

Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. More...

A Nitrogen ransomware attack on Foxconn's North American facilities is one of 600 hits on manufacturers this year, as ga… More...

Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal o… More...

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestra… More...

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...

Have your say

 

News Categories

Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. More...

A Nitrogen ransomware attack on Foxconn's North American facilities is one of 600 hits on manufacturers this year, as ga… More...

Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal o… More...

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestra… More...

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech