Logo
Home
language
Loading...

Deceptive Google Chrome add-ons compromise accounts.

Deceptive Google Chrome add-ons compromise accounts.

Fox News
Fox News27-01-2026
Cybersecurity experts have revealed a significant danger concealed within Google Chrome.
Multiple browser add-ons masquerade as useful utilities. In actuality, they subtly hijack user accounts. These add-ons mimic well-known human resources and commercial platforms such as Workday, NetSuite, and SAP SuccessFactors. Once they are added, they have the ability to extract login credentials and circumvent security measures intended to safeguard users.
Many individuals who installed these extensions recognized no indicators suggesting that anything was amiss.
Subscribe to my FREE CyberGuy Report
Receive my top technology recommendations, urgent security notifications, and exclusive offers directly in your inbox. Additionally, you will gain immediate access to my Ultimate Scam Survival Guide—free upon joining my CYBERGUY.COM newsletter.
WHY CLICKING THE WRONG COPILOT LINK COULD COMPROMISE YOUR DATA
Cybersecurity analysts caution that fraudulent Google Chrome extensions are covertly seizing user accounts by acquiring login credentials and evading security barriers. (Photo credit/Bildquelle/ullstein bild via Getty Images)
Security analysts from Socket's Threat Research Team have pinpointed five harmful Chrome extensions associated with this scheme. The add-ons were advertised as workflow or security solutions, yet were crafted to commandeer accounts.
The extensions comprise:
We contacted Google, and a representative informed CyberGuy that the extensions are no longer accessible on the Chrome Web Store. However, some remain on third-party software download platforms, continuing to pose a threat. If you notice any of these names present in your browser, uninstall them right away.
These harmful add-ons are crafted to appear trustworthy. They utilize professional branding, refined interfaces, and business-oriented descriptions. Some assert they provide quicker access to workplace resources. Others claim to limit user actions to secure company accounts. Privacy statements frequently assure users that no personal data is gathered. For those managing daily responsibilities or business accounts, the presentation appears beneficial rather than dubious.
After installation, the extensions function discreetly in the background. They capture session cookies, which are small pieces of information that indicate to websites that you are logged in. When attackers acquire these cookies, they can gain account access without needing a password. Concurrently, some extensions obstruct access to security sections. Users may find themselves unable to alter passwords, deactivate accounts, or review login histories. One extension even permits criminals to insert stolen login sessions into a different browser, allowing them to sign in instantly as the victim.
This strategy transcends credential theft. It eliminates the capacity to react. Security teams might notice abnormal behavior, yet cannot rectify it through standard measures. Password modifications fail. Account settings vanish. Two-factor authentication tools become inaccessible. Consequently, attackers can retain access for extended durations without interruption.
If you utilize Google Chrome, inspect your extensions now. The procedure takes only a few moments.
Look for unfamiliar titles, particularly those claiming to provide access to HR platforms or business tools.
WEB SKIMMING ATTACKS TARGET MAJOR PAYMENT NETWORKS
Deceptive Chrome add-ons disguised as productivity tools went after users of prominent business platforms like Workday, NetSuite, and SAP SuccessFactors. (Image by S3studio/Getty Images)
If you identify one of these extensions, eliminate it immediately.
Restart your browser after its removal to ensure the extension is entirely deactivated. If Chrome synchronization is active, repeat these steps on all synchronized devices before re-enabling sync.
What steps to take after removing the extension
Removal is just the initial step. Update the passwords for any accounts accessed while the extension was in operation. Use a different browser or device when possible.
A password manager can assist you in creating robust, unique passwords for each account and securely storing them. This minimizes the chances of reused passwords being exploited again.
Next, check if your email has appeared in previous data breaches. Our top password manager choice includes a built-in breach scanner that verifies whether your email address or passwords have been found in known leaks. If you find a match, promptly change any reused passwords and secure those accounts with new, distinct credentials.
Explore the top expert-reviewed password managers of 2026 at Cyberguy.com.
Finally, monitor account activity for unfamiliar logins, locations, or devices, and ensure you follow the steps below to maintain safety moving forward.
Simple practices can significantly decrease your risk.
Only install extensions that you truly require. The fewer extensions you utilize, the smaller your exposure becomes.
Avoid extensions that promise upgraded access or specialized tools for enterprise platforms. Genuine companies seldom require browser add-ons for account access.
Be cautious of extensions that ask for access to cookies, browsing information, or account management. Such permissions can be exploited to seize sessions.
Examine your browser every few months and discard tools that you no longer use or recognize.
WHATSAPP WEB MALWARE DIFFUSES BANKING TROJAN AUTOMATICALLY
Several counterfeit browser extensions were eliminated from the Chrome Web Store after researchers linked them to account takeover maneuvers. (Photo Illustration by Serene Lee/SOPA Images/LightRocket via Getty Images)
Robust antivirus software can help identify harmful extensions, block unusual activities, and alert you to browser-related threats before any harm occurs.
The most effective way to protect yourself from malicious links that could install malware, potentially compromising your private information, is to have powerful antivirus software on all of your devices. This safeguard can also notify you of phishing scams and ransomware threats, keeping your personal data and digital assets secure.
Check out my selections for the best antivirus solutions of 2026 for your Windows, Mac, Android, and iOS devices at Cyberguy.com.
If your work or personal information has been compromised, a data removal service can assist in diminishing your digital footprint by eliminating your details from data broker platforms. This lessens the chance of follow-up scams or identity theft.
Although no service can promise complete removal of your data from the internet, a data removal service is indeed a wise choice. They are not inexpensive, and neither is your privacy. These services handle everything for you, actively monitoring and systematically eliminating your personal information from numerous websites. It provides me with peace of mind and has proved to be the most efficient method for expunging your personal data from the web. By limiting the information available, you decrease the likelihood of scammers cross-referencing data from breaches with information they might uncover on the dark web, making it more challenging for them to focus on you.
Discover my top picks for data removal services and obtain a free scan to determine if your personal information is already online by visiting Cyberguy.com.
Get a free scan to learn if your personal information is already present on the web: Cyberguy.com.
Do not reinstall extensions from third-party sites, even if they profess to offer equivalent features. Such sites often host outdated or malicious versions.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Browser extensions can be beneficial, but this investigation illustrates how easily they can also be exploited. These fraudulent Chrome add-ons did not depend on flashy presentations or overt warnings. They assimilated well, appeared professional, and discreetly caused their harm in the background. The encouraging part is you don’t need to be a tech specialist to defend yourself. Taking a few minutes to evaluate your extensions, remove anything unfamiliar, and secure your accounts can create a significant impact. Small behaviors, consistently practiced, can lead to a major reduction in risk. If there is one key point to remember here, it’s this: convenience should never compromise security. A tidy browser and strong account protections restore your control.
How many browser extensions do you currently have installed that you haven’t reviewed in a while? Share your thoughts with us at Cyberguy.com.
Subscribe to my FREE CyberGuy Report
Receive my top technology recommendations, urgent security notifications, and exclusive deals directly in your inbox. Plus, you will gain immediate access to my Ultimate Scam Survival Guide—free upon joining my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech journalist with a profound passion for technology, equipment, and gadgets that enhance daily life, contributing to Fox News & FOX Business each morning on "FOX & Friends." Have a tech query? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea, or feedback at CyberGuy.com.