Cybersecurity researchers have uncovered a alarming surge in malicious Google Chrome extensions that hijack affiliate links, steal sensitive data, and siphon OpenAI ChatGPT authentication tokens. These deceptive add-ons, masquerading as handy shopping aids and AI enhancers, infiltrate the Chrome Web Store to exploit user trust. Disguised tools like Amazon Ads Blocker from “10Xprofit” promise ad-free browsing but secretly swap creators’ affiliate tags with the developer’s own, robbing influencers of commissions across Amazon, AliExpress, Best Buy, Shein, Shopify, and Walmart.
Socket Security identified 29 such extensions in this cluster, uploaded as recently as January 19, 2026, which scan product URLs without user interaction to inject tags like “10xprofit-20.” They also scrape product details to attacker servers at “app.10xprofit[.]io” and deploy fake “LIMITED TIME DEAL” countdowns on AliExpress pages to spur impulse buys. Misleading store listings claim mere “small commissions” from coupons, violating policies that demand clear disclosures, user consent for injections, and single-purpose designs.
Broadcom’s Symantec separately flagged four data-thieving extensions with over 100,000 installs, including Good Tab, which relays clipboard access to “api.office123456[.]
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article:
