<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ad-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ad-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ad-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Malicious Chrome Extensions Stealing Data and Opening Backdoors</title><link>https://feed.craftedsignal.io/briefs/2026-04-chrome-extension-backdoor/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chrome-extension-backdoor/</guid><description>A coordinated campaign uses 108 malicious Chrome extensions to steal user data, inject ads, and establish backdoors on over 20,000 systems via a shared command-and-control infrastructure.</description><content:encoded><![CDATA[<p>A coordinated campaign involving 108 malicious Chrome extensions has been discovered. These extensions, distributed through five accounts (GameGen, InterAlt, SideGames, Rodeo Games, and Yana Project), are designed to steal user data, inject ads, and create backdoors. Over 20,000 users have installed these extensions. The extensions provide expected functionality to avoid suspicion, but malicious code runs in the background, communicating with a shared C&amp;C infrastructure to perform nefarious activities. The extensions target various user types by masquerading as Telegram sidebar clients, slot machine and Keno games, YouTube and TikTok enhancers, a text translation tool, and page utility extensions. This campaign poses a significant threat to user privacy and system security.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Users install malicious Chrome extensions from the Chrome Web Store, believing they are legitimate tools (e.g., Telegram clients, games, enhancers).</li>
<li>Upon installation, the extensions execute JavaScript code in the background.</li>
<li>Extensions designed for credential theft acquire Google OAuth2 Bearer tokens and exfiltrate user information (email, name, profile picture) to a remote server.</li>
<li>Extensions targeting Telegram steal the active Telegram Web session by overwriting local storage with attacker-supplied data and force-reloading Telegram.</li>
<li>Some extensions contain a backdoor that opens an arbitrary URL received from the C&amp;C server in a new tab upon browser start.</li>
<li>Other malicious activities include injecting ads into YouTube and TikTok pages, injecting content scripts into all visited pages, or proxying translation requests through attacker-controlled servers.</li>
<li>The attacker gains access to user accounts (Google, Telegram) and can inject malicious content, redirect traffic, and steal sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Over 20,000 users have been affected by these malicious extensions. The campaign targets a broad range of users by using different categories of extensions. Successful exploitation can lead to stolen credentials, account takeover, data exfiltration, ad fraud, and the ability to inject arbitrary content into visited websites. The compromised systems could be used for further malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network connections originating from Chrome extensions for connections to unusual or suspicious domains using a network connection rule (see example rule below).</li>
<li>Implement strict policies for Chrome extension installations, including whitelisting approved extensions and blocking installation from untrusted sources.</li>
<li>Deploy the Sigma rule to detect the execution of scripts from the malicious extensions to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chrome-extension</category><category>credential-theft</category><category>backdoor</category><category>ad-injection</category><category>exfiltration</category></item></channel></rss>