8.8 Million Chrome, Edge And Opera Users Compromised In 2026

By: Arslan Ali

On: Saturday, February 14, 2026 9:09 AM

8.8 Million Chrome, Edge And Opera Users Compromised
Google News
Follow Us

8.8 Million Chrome, Edge And Opera Users Compromised. If you use Google Chrome, Microsoft Edge, or Opera, this news might concern you. Over 8.8 million browser users were compromised through malicious extensions in one of the largest campaigns ever uncovered. In this 2026 rewrite, we break down what happened, who was behind it, and how you can protect yourself moving forward.

The DarkSpectre Threat Group

A newly identified Chinese-linked threat actor, known as DarkSpectre, has been connected to one of the most widespread browser extension malware operations ever discovered. According to cybersecurity researchers at Koi.ai, this operation silently infected users over a seven-year period, targeting popular browsers without raising suspicion.

Key Entities Involved

  • DarkSpectre (Threat Group)
  • Koi.ai (Cybersecurity Research Firm)
  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox
  • Opera Browser

What makes this campaign alarming is its scale, patience, and sophistication. Instead of quick attacks, DarkSpectre focused on long-term persistence, blending into trusted browser ecosystems.

How the Malware Operation Worked

DarkSpectre did not rely on a single malware strain. Instead, it orchestrated three interconnected campaigns, each designed for a specific purpose but working toward a shared intelligence-gathering goal.

The Three Campaigns at a Glance

Campaign NameInfected UsersPrimary GoalBrowsers Targeted
ShadyPanda5.6 millionSurveillance & affiliate fraudChrome, Edge
GhostPoster1+ millionStealth code executionFirefox, Opera
Zoom Stealer2.2 millionCorporate espionageChrome, Edge

Together, these campaigns formed a coordinated malware ecosystem, not isolated attacks.

ShadyPanda Campaign: Silent Surveillance at Scale

The ShadyPanda campaign was the largest and most damaging component, responsible for over 5.6 million infections.

How ShadyPanda Tricked Users

The malicious extensions were disguised as:

  • New tab customizers
  • Language translation tools
  • Productivity add-ons

Many of these extensions appeared completely legitimate and even remained clean for years before activating malicious behavior.

What Happened After Installation

Once installed, the extensions:

  • Contacted command-and-control (C2) servers
  • Downloaded hidden configurations
  • Injected remote JavaScript
  • Hijacked search results
  • Monitored browsing behavior

Known Malicious Domains

  • jt2x.com
  • infinitynewtab.com

These domains allowed attackers to update payloads remotely, making detection extremely difficult.

GhostPoster Campaign: Malware Hidden Inside Images

The GhostPoster campaign took stealth to another level by using steganography, a technique where malicious code is hidden inside image files.

Why This Technique Was Dangerous

Instead of loading suspicious scripts, the extensions:

  • Embedded JavaScript inside PNG images
  • Appeared harmless to security scanners
  • Remained dormant for days after installation

After the delay, the malware extracted and executed the hidden payload.

Impact of GhostPoster

  • Affected over one million users
  • Enabled remote code execution
  • Avoided traditional detection tools

Infrastructure Used

  • gmzdaily.com
  • mitarchive.info

This approach shows how browser-based attacks have evolved beyond basic script injection.

The Zoom Stealer Campaign: Corporate Espionage Explained

The most recent and arguably most dangerous operation was The Zoom Stealer campaign, which targeted corporate users rather than casual browsing activity.

How Zoom Stealer Operated

The extensions posed as:

  • Video downloaders
  • Productivity enhancers
  • Meeting tools

Behind the scenes, they harvested sensitive corporate data from 28+ video conferencing platforms.

Platforms Affected

  • Zoom
  • Microsoft Teams
  • Google Meet
  • Webex
  • Skype

Data Collected

  • Meeting links
  • Login credentials
  • Speaker identities
  • Organizational metadata

This information could be used for corporate espionage, phishing, or insider reconnaissance.

Data Exfiltration & Cloud Abuse

One of the most alarming discoveries was how attackers transmitted stolen data.

Technologies Used

  • WebSocket connections (real-time data transfer)
  • Google Firebase databases
  • Google Cloud Functions

Known Endpoints

  • zoocorder.firebaseio.com
  • webinarstvus.cloudfunctions.net

By abusing trusted cloud platforms, DarkSpectre blended malicious traffic with legitimate services — a major challenge for security teams.

Why Browser Extension Attacks Are Increasing in 2026

Browser extensions remain a high-value attack surface because:

  • Users blindly trust official extension stores
  • Permissions are often excessive
  • Security reviews are inconsistent

Common Risk Factors

  • “Read and change all your data” permissions
  • Poor update monitoring
  • Abandoned extensions sold to attackers

How to Protect Yourself from Malicious Extensions

Best Practices for Browser Security

  • Install extensions only from verified developers
  • Avoid extensions with unnecessary permissions
  • Regularly audit installed add-ons
  • Remove unused extensions immediately

Enterprise-Level Recommendations

  • Use browser extension allowlists
  • Monitor outbound WebSocket traffic
  • Deploy endpoint detection solutions
  • Conduct regular extension reviews

FAQs

What is DarkSpectre malware?

DarkSpectre is a Chinese-linked threat group responsible for infecting millions of users through malicious browser extensions.

Which browsers were affected?

Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera were all targeted.

How can I check if an extension is malicious?

Review permissions, developer history, update behavior, and uninstall extensions you no longer need.

Are official extension stores safe?

They are safer than third-party sites, but not completely risk-free.

Can browser malware steal corporate data?

Yes. The Zoom Stealer campaign proves browser extensions can be used for corporate espionage.

Conclusion

The compromise of 8.8 million browser users is a wake-up call for both individuals and organizations. As browser extensions grow more powerful, attackers are exploiting trust at an unprecedented scale.

Arslan Ali

Arslan Ali is a Pakistani blogger who shares simple and trusted information about BISP 8171 and other PM & CM schemes. He explains updates in easy words so people can quickly understand registration, eligibility, and payment details. His goal is to help families stay informed with accurate and real-time guidance.

Leave a Comment