Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Every day, millions of individuals install browser add-ons with the belief that these tools will enhance their productivity or entertainment experience. Given the vast array of options on the Chrome Web Store, users often depend on trust indicators such as install counts, user reviews, and developer reputations to guide their choices. Many users glance at shiny verification badges and five-star ratings, assuming that the vetting process is sufficiently thorough, and click on ‘Install’ without a second thought.
Unfortunately, cyber attackers have learned to exploit these trust signals. Recent research has unveiled a coordinated campaign involving 18 browser extensions available on both Chrome and Edge web stores that tracked users’ online activities. Alarmingly, these extensions have accumulated over two million installations.
Koi Security researchers have shown that cybercriminals employed strategic tactics over an extended period to weaponize these browser extensions. Initially, they released legitimate, functional tools to win users’ trust. Over time, these extensions garnered positive reviews and cultivated a credible reputation. After months, or even years, of inconspicuous operation, the attackers executed a stealthy update that inserted malicious scripts into the trusted codebase.
Since these updates originated from official sources, they easily bypassed corporate firewalls. Unlike phishing emails or dubious downloads, the harmful code arrived through routine, automatic updates, sparking no immediate concerns.
As investigators delved deeper into the situation, they tracked suspicious network traffic back to an innocuous color picker extension. This discovery led them to a web of interconnected domains, each functioning as a command and control hub. These servers logged every URL visited by users and sent commands to redirect them to fraudulent websites or ad-loaded landing pages.
Further analysis of the extension’s code revealed matching fingerprints across several unrelated tools, including weather widgets, emoji keyboards, video speed controllers, and volume boosters. While these tools appeared different at first glance, they shared similar underlying code and behaviors.
Collectively, these malicious extensions accounted for over two million installations. To evade detection, the attackers employed varied branding and categories, which complicated marketplace monitoring efforts. Even more troubling, many of the extensions bore verified badges, indicating how the attackers manipulated automated review systems through malicious version updates.
For users affected by this situation, the critical first step is to immediately uninstall the identified malicious extensions, followed by a thorough cache clearing and comprehensive system scan. Users must check their computers for these malicious extensions and remove them right away.
If you have any extensions linked to the RedDirection campaign, follow these steps promptly to safeguard your data and devices:
Browser extensions can undoubtedly provide valuable functions, but they also come with potential hidden dangers. The recent findings illustrate that even trusted tools from official stores can turn malicious without warning. Consequently, it is essential for users to remain vigilant, conduct regular reviews of their extensions, and employ strong antivirus protection to ensure their online safety. Adopting a few straightforward habits can significantly contribute to the security of your browser and personal information.
Do you prioritize ratings and reviews when selecting your extensions, or do you delve deeper into their functionality and safety? We invite you to share your thoughts with us.