8.8m Browser Users Hit by Chinese Malware Operation

chinese malware operation

Cybersecurity researchers have exposed a massive malware campaign linked to a Chinese threat actor known as DarkSpectre, which has infected over 8.8 million users across Chrome, Edge, Firefox, and Opera browsers through malicious extensions. This sophisticated operation, spanning seven years, evolved from simple affiliate fraud to full-scale browser surveillance and corporate espionage, exploiting trusted browser marketplaces to build massive user bases before activating hidden backdoors.

The revelation, detailed in reports from Koi Security released in late December 2025, underscores vulnerabilities in extension review processes and highlights the risks of seemingly legitimate tools turning rogue via silent updates.

Unmasking DarkSpectre: The Mastermind Behind the Campaigns

DarkSpectre stands out for its operational maturity, running parallel campaigns with distinct playbooks tailored to different browsers and objectives, all while maintaining legitimate facades for years. Researchers connected the dots through shared infrastructure like domains such as infinitynewtab.com and api.jt2x.com, which powered benign features in extensions but linked to malicious command-and-control (C2) servers hosted on Alibaba Cloud in China.

Attribution to a Chinese operation relies on multiple indicators: ICP registrations tied to provinces like Hubei, Chinese-language code artifacts, and targeting of e-commerce giants JD.com and Taobao for affiliate fraud. Unlike opportunistic hackers, DarkSpectre demonstrates nation-state-level patience, investing in long-term trust-building across 300+ extensions before weaponization.

This isn’t isolated; it builds on earlier phases where the group tested marketplace weaknesses with wallpaper apps injecting affiliate codes on sites like Amazon and eBay. By late 2025, the actor controlled backdoors capable of arbitrary code execution, turning browsers into persistent surveillance tools.

ShadyPanda: The Flagship Surveillance Empire Infecting 5.6 Million

ShadyPanda forms the core of DarkSpectre’s operations, starting with 145 extensions in 2023 disguised as wallpaper and productivity apps that siphoned commissions from user clicks on major retailers. Evolving into search hijackers like Infinity V+, these tools redirected queries through suspicious domains like trovi.com, logging keystrokes and exfiltrating cookies to servers such as nossl.dergoodting.com.

The masterstroke came in mid-2024: five extensions, including “Featured” and “Verified” Clean Master with 200,000 installs, flipped malicious after years of clean operation, affecting 300,000 users with hourly RCE checks to api.extensionplay.com. These backdoors download obfuscated JavaScript—often disguised as PNGs—granting full browser access for keystroke logging, content injection, and MITM attacks, all while evading detection by hiding when developer tools open.

Parallel to this, five Starlab Technology extensions on Edge, led by WeTab with 3 million installs, actively spy on 4 million users, capturing every URL, search query, mouse click (with pixel precision), and page interaction, streaming data to 17 Chinese servers including Baidu and WeTab endpoints. Expansions revealed 100+ extensions, with 9 active, 85 dormant “sleepers,” pushing the ShadyPanda toll to 5.6 million.

GhostPoster: Stealthy Payloads Hidden in Images Target 1 Million

GhostPoster’s playbook exploits Firefox and Opera via steganography: malicious JavaScript embedded in PNG icon files, extracted post-install with 48-hour delays and 10% activation rates to dodge reviews. Affecting 1.05 million users across 18 extensions, it shares C2 domains like liveupdt.com with ShadyPanda, confirming unified control.

A shocking extension, “Google™ Translate” by charliesmithbons on Opera (nearly 1 million installs), strips site security, injects iframes for RCE, and disables anti-fraud on Chinese shopping links, phoning home to mitarchive.info and gmzdaily.com. This cross-marketplace agility—Chrome to Opera—highlights DarkSpectre’s platform mastery, turning trusted translation tools into backdoors.

The technique’s elegance lies in its review-proof nature: benign during submission, payload-loaded later, enabling affiliate hijacks and surveillance without triggering static scans.

Zoom Stealer: Corporate Espionage via 2.2 Million Meeting Harvesters

DarkSpectre’s most insidious campaign, the Zoom Stealer, targets corporate secrets through 18 extensions like “Twitter X Video Downloader” and “Chrome Audio Capture” (800,000 installs), requesting permissions for 28 platforms including Zoom, Teams, and WebEx. These “productivity” tools scrape webinar pages for links (with passwords), IDs, topics, and real-time participant data via WebSocket streams to zoocorder.firebaseio.com.

Beyond logistics, they build speaker dossiers—names, titles, bios, photos, companies—plus logos and attendance patterns, exfiltrating via Google Cloud Functions for a searchable intelligence database. Bridged by infinitynewtab.com to ShadyPanda, this 2.2 million-user op enables espionage: selling roadmap calls, sales intel, or phishing fodder like “Sarah from the webinar.”

Unlike consumer fraud, this fuels strategic attacks—M&A intel, competitor spying—exposing how browser permissions grant outsiders network-level access without AV alerts.

Technical Arsenal: From Obfuscation to Remote Control

DarkSpectre’s code employs layered evasion: custom XOR encoding, packed JS interpreters bypassing CSP, anti-debug tricks sensing dev tools, and config-driven payloads from C2s like api.jt2x.com dictating fraud targets or surveillance depth. RCE frameworks poll hourly for updates, executing anything from Taobao link swaps to credential theft.

WeTab exemplifies intrusiveness: keystroke-monitored searches, scroll-tracked sessions, fingerprinting surviving reinstalls via sync storage, all AES-encrypted to Chinese servers. Zoom tools use persistent WebSockets for live feeds, while GhostPoster PNG stego loads multi-stage payloads probabilistically.

This modularity—remote swaps sans updates—renders static reviews obsolete, as behaviors shift post-approval.

Chinese Ties and Broader Implications for Global Security

Infrastructure screams China: Alibaba-hosted C2s, Hubei ICPs, timezone-aligned commits, and e-commerce focus on domestic platforms. Whether state-sponsored or tolerated cybercrime, the scale demands resources beyond lone wolves, echoing past ops like Fireball (250M infections) but with espionage twists.

Victims span consumers (fraud) to enterprises (meeting leaks), with 20% corporate hit rates in prior analogs. Data monetization via sales intel, impersonation kits, or state intel sharing amplifies risks, especially amid rising supply-chain worries.

For regions like South Asia and Latin America—your publishing foci—this hits home: global browsers mean local users’ data flows to China, fueling targeted scams on emerging e-com.

How Victims Got Infected and What It Means Day-to-Day

Infection starts innocently: users grab “helpful” extensions from Chrome Web Store (badges boosting trust), Edge Add-ons, Firefox Marketplace, or Opera—often “Featured” after years of fakes. Auto-updates deliver payloads silently; no phishing needed.

Daily impacts: hijacked searches inflate affiliate costs, surveillance profiles for ads/phishing, corporate users leak secrets unwittingly. Enterprises face breached repos, SaaS logins; consumers lose privacy to pixel-tracked habits.

Official Responses: Removals, But Infrastructure Lingers

Koi’s disclosures prompted Google to yank ShadyPanda Chrome extensions, Microsoft some Edge ones, but Edge laggards like WeTab persist as of early 2026, infecting anew. Firefox/Opera cleanups followed GhostPoster IOCs; no DarkSpectre arrests announced.

Browser giants tout improved behavioral monitoring, yet seven-year gaps expose flaws—reviews ignore sleepers. Koi’s Wings engine exemplifies fixes: continuous analysis catching post-approval shifts.

Protecting Yourself: Essential Steps for Users and Businesses

Scan extensions via tools like Koi or Shortwave; revoke broad permissions (all URLs, tabs) routinely. Enterprises: policy-block unknown extensions, monitor C2 IOCs (infinitynewtab.com, api.jt2x.com, etc.), deploy behavioral EDR.

Users: stick to verified devs, audit via chrome://extensions, use extension whitelists. Update browsers; consider containers isolating add-ons. For devs: minimize permissions, avoid sync storage for IDs.

The Bigger Picture: A Wake-Up Call for Browser Ecosystems

DarkSpectre’s 8.8M tally—5.6M ShadyPanda, 1M+ GhostPoster, 2.2M Zoom—proves marketplaces incentivize long-cons: trust signals aid scale, updates bypass gates. As AI aids obfuscation, expect copycats; 2026 forecasts more sleeper threats.

This saga demands overhaul: runtime vetting, user warnings on permissions, C2 blacklists. Until then, vigilance trumps convenience—your browser is the new battlefield


Subscribe to Our Newsletter

Related Articles

Top Trending

Sovereign AI Infrastructure
7 Things You Need to Know About Canada's National AI Strategy and Sovereign AI Infrastructure
Generative AI for Canadian Startups
8 Proven Ways Canadian Startups Are Using Generative AI to Compete Globally
Structured Data for Events and Webinars
Transform Your Marketing Using Structured Data for Events and Webinars!
Truecasting in Relationships
Why Truecasting in Relationships is the 2026 Standard for Finding Real Connection
Kharg Island Iran Oil Lifeline
Trump’s Strategic Gamble: Why Iran’s Oil Lifeline Kharg Island Remains Untouched

Fintech & Finance

Gamified Finance Education for Kids
Level Up Your Child’s Future with “Gamified Finance Education for Kids”!
The Complete Guide to Online Surveys for Money Payouts
The Complete Guide to Online Surveys for Money Payouts
Is American Economic Expansion Sustainable
Is American Economic Expansion Sustainable? A Full Analysis (2025–2026)
Home Loan Eligibility: How Much Can You Get on Your Salary?
How Much Home Loan Can You Get on Your Salary and What Are the Other Eligibility Factors?
The ROI of a Master's Degree in 2026
The Surprising Truth About the ROI Of A Master's Degree In 2026

Sustainability & Living

Vertical Forests Architecture That Breathes
Transform Your Space with Vertical Forests: Architecture That Breathes!
Sustainable Fashion How to Build a Capsule Wardrobe
Sustainable Fashion: How to Build A Capsule Wardrobe
Blue Economy
Dive into The "Blue Economy": Protecting Our Oceans Together!
Sustainable Cities Urban Planning for a Green Future
Transform Your City with Sustainable Cities: Urban Planning for A Green Future
best smart blinds
12 Best Smart Blinds and Shades [Automated Curtains]

GAMING

best gaming headsets with mic monitoring
12 Best Gaming Headsets with Mic Monitoring
Best capture cards for streaming
10 Best Capture Cards for Streaming Console Gameplay
Gamification in Education Beyond Points and Badges
Engage Students Like Never Before: “Gamification in Education: Beyond Points and Badges”
iGaming Player Wellbeing: Strategies for Balanced Play
The Debate Behind iGaming: How Best to Use for Balanced Player Wellbeing
Hypackel Games
Hypackel Games A Look at Player Shaped Online Play

Business & Marketing

Confidence vs Ego Knowing the Difference
Confidence Vs Ego: Knowing The Difference [Mastering Self-Identity Explained]
The Complete Guide to Online Surveys for Money Payouts
The Complete Guide to Online Surveys for Money Payouts
Emotional Intelligence skill
Emotional Intelligence: The Skill AI Can't Replace [Unlock Your Potential]
Power Of Vulnerability In Leadership
The Power Of Vulnerability In Leadership And Life [Transform Your Impact]
Home Loan Eligibility: How Much Can You Get on Your Salary?
How Much Home Loan Can You Get on Your Salary and What Are the Other Eligibility Factors?

Technology & AI

How to Use AI For Content Creation Without Losing Your Voice
How to Use AI for Content Creation Without Losing Your Authentic Voice
Robots.txt File
Robots.txt File: The Most Dangerous File On Your Website [Beware]
Andrew Ting MD: Quality Data Powers Safer Healthcare AI
Andrew Ting MD Explains Why High-Quality Medical Data Is Key to Smarter, Safer AI in Healthcare
French Tech Visa a gateway to europe
The French "Tech Visa": A Gateway to Europe! Boost Your Career
What Is ImagineLab.art
What Is ImagineLab.art? Inside Editorialge Media's Unified AI Creative Platform

Fitness & Wellness

Mindfulness For Skeptics
Mindfulness For Skeptics: Science-Backed Benefits You Must Know!
Burnout Recovery A Step-by-Step Guide
Transform Your Wellness with Burnout Recovery: A Step-by-Step Guide
best journals for gratitude and mindfulness
10 Best Journals for Gratitude and Mindfulness
Finding Purpose Ikigai for the 2026 Professional
Finding Purpose: Ikigai for The 2026 Professional
Visualizing Success The Science Behind Mental Imagery
Visualizing Success: The Science Behind Mental Imagery