Fake AI assistants in Chrome Web Store steal passwords and spy on emails

March 20, 20269 min read3 sources
Share:
Fake AI assistants in Chrome Web Store steal passwords and spy on emails

Background and context

A fresh warning from browser security researchers at LayerX points to a troubling twist on the AI boom: malicious browser extensions posing as ChatGPT, Gemini, Grok, and similar assistants in the Google Chrome Web Store have reportedly been downloaded hundreds of thousands of times, giving attackers a direct route into users’ accounts, inboxes, and browsing sessions Infosecurity Magazine. The campaign matters because it does not rely on a browser zero-day or a sophisticated exploit chain. Instead, it uses a simpler and often more effective method: persuading users to install hostile software themselves.

This is part of a broader trend in which attackers abuse browser extensions as a delivery mechanism for credential theft and surveillance. Extensions occupy a privileged position inside the browser. Depending on the permissions granted, they can read page contents, inspect cookies, monitor tabs, interact with webmail, and inject scripts into websites. Researchers and defenders have warned for years that a malicious extension can function much like spyware within the browser itself, especially when users approve broad access without closely checking the developer or requested permissions Google Chrome extension documentation.

The AI angle gives this campaign extra force. Users are actively searching for browser-based AI helpers that summarize emails, draft text, answer questions, or provide quick access to popular chatbots. That demand creates an ideal social-engineering lure. A fake assistant promising convenient AI features can appear useful enough that users overlook warning signs such as vague publisher details, excessive permissions, or suspicious reviews. LayerX’s findings suggest that attackers are exploiting exactly that trust gap Infosecurity Magazine.

Technical details

Based on the public reporting, these extensions impersonate well-known AI brands and are distributed through the Chrome Web Store rather than side-loaded from obscure websites. That distinction is important. Many users assume a store listing means an extension has been thoroughly vetted and is safe. In reality, store review processes reduce risk but do not eliminate it, especially when attackers continuously adapt their listings, branding, and code behavior.

The core abuse pattern described by LayerX combines three capabilities: credential theft, session hijacking, and email surveillance Infosecurity Magazine. In practice, that likely means one or more of the following:

1. Permission abuse. Malicious extensions often request access such as “Read and change all your data on the websites you visit,” access to tabs, cookies, scripting, storage, or host permissions for webmail and login pages. Those permissions can allow an extension to inspect page content, capture form submissions, or interact with authenticated sessions. Google’s own documentation makes clear that broad host permissions can expose sensitive browsing activity if misused Google Chrome extension permissions.

2. Credential theft. An extension can monitor login forms, scrape entered usernames and passwords from page content, or intercept authentication flows on targeted sites. Even if it cannot directly extract passwords from Chrome’s password manager, it may still capture credentials as users type them into web apps. This is enough to compromise email, SaaS, banking, or enterprise accounts.

3. Session hijacking. Session cookies and authentication tokens are often more valuable than passwords because they can let an attacker piggyback on an already authenticated session. If an extension can access cookies or page data from active sessions, it may enable account takeover without immediately triggering a password prompt. This is especially dangerous in environments using single sign-on, where one browser session can unlock multiple internal services.

4. Email spying. The reported ability to spy on emails raises the stakes considerably. If an extension has access to Gmail or another webmail interface, it may read message content, metadata, and threads directly from the page after the user logs in. That gives attackers visibility into password reset messages, financial discussions, internal documents, customer conversations, and legal or HR correspondence.

5. Exfiltration and persistence. Once installed, an extension remains active across browser sessions and can quietly send harvested data to attacker-controlled infrastructure. Because the browser is a trusted application, this traffic may blend into normal web activity unless defenders are specifically inspecting extension behavior.

There is no indication in the reporting that this campaign depended on a Chrome software vulnerability with a CVE assignment. This appears to be a store abuse and malware distribution problem, not a browser exploit in the classic sense Infosecurity Magazine. That distinction matters because patching Chrome alone does not solve the issue if the malicious extension is already installed.

Why browser extensions are so dangerous

Browser extensions are often treated by users as lightweight add-ons, but from a security perspective they are privileged code running inside one of the most sensitive applications on the device. The browser is where people log into email, corporate portals, banking sites, cloud dashboards, and password managers. A malicious extension placed there can observe a large share of a user’s digital life.

For organizations, this turns the browser into a major identity risk. If an employee installs a fake AI extension on a work-managed Chrome profile, the extension may gain access not only to personal browsing but also to business email, internal SaaS apps, and collaboration tools. In many environments, that can open the door to data theft, wire fraud, or business email compromise. LayerX’s framing of the browser as a key attack surface lines up with a wider industry shift toward treating browser security as part of endpoint and identity defense.

Impact assessment

Who is affected: anyone who installed one of the malicious AI-themed extensions is at direct risk. That includes home users, freelancers, students, and enterprise employees. Organizations are indirectly affected when staff install unapproved extensions in work browsers or on devices used to access company systems.

What can be stolen: passwords, session cookies, email contents, and potentially access to cloud services linked through the same browser profile. If the compromised email account is used for password resets, the attacker may be able to pivot to many other services.

How severe it is: high. A malicious extension with broad permissions can produce the same downstream harm as infostealer malware, even if it arrives through a more familiar and trusted channel. The combination of email monitoring and session theft is particularly serious because it enables both surveillance and direct account takeover. For business users, the impact can extend to confidential data exposure, fraud, and lateral access into corporate systems.

Why the scale matters: the reported download numbers suggest this is not a niche scam with a handful of victims. If hundreds of thousands of installs were achieved before public exposure, the campaign demonstrates how effective AI branding has become as a lure and how difficult it can be for users to distinguish legitimate tools from impostors Infosecurity Magazine.

How to protect yourself

Check installed extensions now. Open Chrome’s extension manager and remove anything you do not recognize, especially AI assistants you installed recently. Pay close attention to extensions impersonating major brands or offering vague “AI helper” features.

Review permissions before installing. Be skeptical of any extension asking to read and change data on all websites, access cookies, or interact with tabs unless that access is clearly necessary for its function. Broad permissions should be treated as a warning sign, not a routine click-through.

Verify the publisher. Look beyond the extension name and icon. Check the listed developer, website, privacy policy, and support links. Brand names like ChatGPT, Gemini, or Grok are easy to copy; verified publisher details are harder to fake convincingly.

Assume email access is sensitive. If an extension touches Gmail or another webmail service, treat it as high risk. Email is often the recovery channel for your other accounts, so compromise there can cascade quickly.

Rotate passwords and sign out of sessions if you installed a suspicious extension. Remove the extension, clear browser cookies, sign out of important accounts, and change passwords starting with email and any accounts tied to financial or work activity. If available, review active sessions and revoke unknown devices.

Enable multi-factor authentication. MFA will not stop all session hijacking, but it still reduces the damage from stolen passwords and makes follow-on account abuse harder.

Use separate browser profiles for work and personal use. Segmentation limits how much a single malicious extension can see. Enterprises should go further with extension allowlists and managed browser policies.

Watch for unusual account activity. Check sent mail, login history, security alerts, and password reset emails. Unexpected messages, unknown sessions, or new forwarding rules can indicate email compromise.

Protect browser traffic on untrusted networks. While a VPN will not neutralize a malicious extension, using a trusted VPN service can still help reduce exposure on public Wi‑Fi and improve general privacy protection.

For organizations: lock down extension installs. Enterprises should inventory installed extensions, restrict installation to approved lists, monitor for suspicious permissions, and treat browser telemetry as a source of threat signals. Security teams should also educate staff that AI branding is a lure category, not proof of legitimacy.

The bigger picture

This campaign shows how attackers are adapting old tactics to new user habits. Malicious extensions are not new, and neither is brand impersonation. What has changed is the strength of the AI lure. Users now expect AI tools to integrate with browsers, summarize emails, and access web content, which makes broad permissions seem more normal than they should. That normalization is dangerous.

The lesson is straightforward: browser extensions should be treated with the same caution as any other software installation. If an add-on can read your inbox, inspect your sessions, and interact with every page you visit, it deserves the same scrutiny you would give a desktop app that requested access to all of your files. For users seeking privacy protection while browsing, tools like hide.me VPN can support safer habits, but they are not a substitute for extension hygiene, permission review, and strong account security.

Share:

// FAQ

How do fake AI Chrome extensions steal passwords and email data?

They typically request broad browser permissions, then monitor web pages, capture login data, access cookies or tokens, and read content from webmail sessions such as Gmail while the user is logged in.

Can changing my password fix the problem after installing a malicious extension?

Not by itself. You should remove the extension, clear cookies, sign out of active sessions, review account activity, then change passwords and enable MFA. If session tokens were stolen, attackers may remain logged in until sessions are revoked.

Why are AI-themed browser extensions such an effective lure?

Users are actively searching for AI assistants and often expect them to need broad access to web content or email. Attackers exploit that expectation by disguising spyware-like extensions as helpful productivity tools.

Are enterprises at risk from employee-installed Chrome extensions?

Yes. A malicious extension in a work browser can expose business email, SaaS apps, internal portals, and SSO sessions. That can lead to data theft, account takeover, and business email compromise.

// SOURCES

// RELATED

Project Compass targets The Com with 30 arrests across youth cybercrime network

Europol’s Project Compass hits The Com with 30 arrests, exposing how youth cybercrime networks blend social engineering, extortion and ransomware.

8 min readMar 20

9 critical IP KVM flaws expose a dangerous new path to root access

Nine flaws in low-cost IP KVMs could give attackers unauthenticated root access and stealthy control over connected systems.

8 min readMar 20

Critical GNU InetUtils telnetd flaw raises urgent questions about legacy remote access risk

A reported GNU InetUtils telnetd flaw could enable unauthenticated root RCE, putting legacy Telnet-exposed systems at serious risk.

7 min readMar 20

New DarkSword iOS exploit used in infostealer attack on iPhones

A reported DarkSword iPhone campaign shows how iOS exploits and infostealers can expose personal data and crypto wallets alike.

8 min readMar 20