8.8m Browser Users Hit by Chinese Malware Operation

chinese malware operation

Cybersecurity researchers have exposed a massive malware campaign linked to a Chinese threat actor known as DarkSpectre, which has infected over 8.8 million users across Chrome, Edge, Firefox, and Opera browsers through malicious extensions. This sophisticated operation, spanning seven years, evolved from simple affiliate fraud to full-scale browser surveillance and corporate espionage, exploiting trusted browser marketplaces to build massive user bases before activating hidden backdoors.

The revelation, detailed in reports from Koi Security released in late December 2025, underscores vulnerabilities in extension review processes and highlights the risks of seemingly legitimate tools turning rogue via silent updates.

Unmasking DarkSpectre: The Mastermind Behind the Campaigns

DarkSpectre stands out for its operational maturity, running parallel campaigns with distinct playbooks tailored to different browsers and objectives, all while maintaining legitimate facades for years. Researchers connected the dots through shared infrastructure like domains such as infinitynewtab.com and api.jt2x.com, which powered benign features in extensions but linked to malicious command-and-control (C2) servers hosted on Alibaba Cloud in China.

Attribution to a Chinese operation relies on multiple indicators: ICP registrations tied to provinces like Hubei, Chinese-language code artifacts, and targeting of e-commerce giants JD.com and Taobao for affiliate fraud. Unlike opportunistic hackers, DarkSpectre demonstrates nation-state-level patience, investing in long-term trust-building across 300+ extensions before weaponization.

This isn’t isolated; it builds on earlier phases where the group tested marketplace weaknesses with wallpaper apps injecting affiliate codes on sites like Amazon and eBay. By late 2025, the actor controlled backdoors capable of arbitrary code execution, turning browsers into persistent surveillance tools.

ShadyPanda: The Flagship Surveillance Empire Infecting 5.6 Million

ShadyPanda forms the core of DarkSpectre’s operations, starting with 145 extensions in 2023 disguised as wallpaper and productivity apps that siphoned commissions from user clicks on major retailers. Evolving into search hijackers like Infinity V+, these tools redirected queries through suspicious domains like trovi.com, logging keystrokes and exfiltrating cookies to servers such as nossl.dergoodting.com.

The masterstroke came in mid-2024: five extensions, including “Featured” and “Verified” Clean Master with 200,000 installs, flipped malicious after years of clean operation, affecting 300,000 users with hourly RCE checks to api.extensionplay.com. These backdoors download obfuscated JavaScript—often disguised as PNGs—granting full browser access for keystroke logging, content injection, and MITM attacks, all while evading detection by hiding when developer tools open.

Parallel to this, five Starlab Technology extensions on Edge, led by WeTab with 3 million installs, actively spy on 4 million users, capturing every URL, search query, mouse click (with pixel precision), and page interaction, streaming data to 17 Chinese servers including Baidu and WeTab endpoints. Expansions revealed 100+ extensions, with 9 active, 85 dormant “sleepers,” pushing the ShadyPanda toll to 5.6 million.

GhostPoster: Stealthy Payloads Hidden in Images Target 1 Million

GhostPoster’s playbook exploits Firefox and Opera via steganography: malicious JavaScript embedded in PNG icon files, extracted post-install with 48-hour delays and 10% activation rates to dodge reviews. Affecting 1.05 million users across 18 extensions, it shares C2 domains like liveupdt.com with ShadyPanda, confirming unified control.

A shocking extension, “Google™ Translate” by charliesmithbons on Opera (nearly 1 million installs), strips site security, injects iframes for RCE, and disables anti-fraud on Chinese shopping links, phoning home to mitarchive.info and gmzdaily.com. This cross-marketplace agility—Chrome to Opera—highlights DarkSpectre’s platform mastery, turning trusted translation tools into backdoors.

The technique’s elegance lies in its review-proof nature: benign during submission, payload-loaded later, enabling affiliate hijacks and surveillance without triggering static scans.

Zoom Stealer: Corporate Espionage via 2.2 Million Meeting Harvesters

DarkSpectre’s most insidious campaign, the Zoom Stealer, targets corporate secrets through 18 extensions like “Twitter X Video Downloader” and “Chrome Audio Capture” (800,000 installs), requesting permissions for 28 platforms including Zoom, Teams, and WebEx. These “productivity” tools scrape webinar pages for links (with passwords), IDs, topics, and real-time participant data via WebSocket streams to zoocorder.firebaseio.com.

Beyond logistics, they build speaker dossiers—names, titles, bios, photos, companies—plus logos and attendance patterns, exfiltrating via Google Cloud Functions for a searchable intelligence database. Bridged by infinitynewtab.com to ShadyPanda, this 2.2 million-user op enables espionage: selling roadmap calls, sales intel, or phishing fodder like “Sarah from the webinar.”

Unlike consumer fraud, this fuels strategic attacks—M&A intel, competitor spying—exposing how browser permissions grant outsiders network-level access without AV alerts.

Technical Arsenal: From Obfuscation to Remote Control

DarkSpectre’s code employs layered evasion: custom XOR encoding, packed JS interpreters bypassing CSP, anti-debug tricks sensing dev tools, and config-driven payloads from C2s like api.jt2x.com dictating fraud targets or surveillance depth. RCE frameworks poll hourly for updates, executing anything from Taobao link swaps to credential theft.

WeTab exemplifies intrusiveness: keystroke-monitored searches, scroll-tracked sessions, fingerprinting surviving reinstalls via sync storage, all AES-encrypted to Chinese servers. Zoom tools use persistent WebSockets for live feeds, while GhostPoster PNG stego loads multi-stage payloads probabilistically.

This modularity—remote swaps sans updates—renders static reviews obsolete, as behaviors shift post-approval.

Chinese Ties and Broader Implications for Global Security

Infrastructure screams China: Alibaba-hosted C2s, Hubei ICPs, timezone-aligned commits, and e-commerce focus on domestic platforms. Whether state-sponsored or tolerated cybercrime, the scale demands resources beyond lone wolves, echoing past ops like Fireball (250M infections) but with espionage twists.

Victims span consumers (fraud) to enterprises (meeting leaks), with 20% corporate hit rates in prior analogs. Data monetization via sales intel, impersonation kits, or state intel sharing amplifies risks, especially amid rising supply-chain worries.

For regions like South Asia and Latin America—your publishing foci—this hits home: global browsers mean local users’ data flows to China, fueling targeted scams on emerging e-com.

How Victims Got Infected and What It Means Day-to-Day

Infection starts innocently: users grab “helpful” extensions from Chrome Web Store (badges boosting trust), Edge Add-ons, Firefox Marketplace, or Opera—often “Featured” after years of fakes. Auto-updates deliver payloads silently; no phishing needed.

Daily impacts: hijacked searches inflate affiliate costs, surveillance profiles for ads/phishing, corporate users leak secrets unwittingly. Enterprises face breached repos, SaaS logins; consumers lose privacy to pixel-tracked habits.

Official Responses: Removals, But Infrastructure Lingers

Koi’s disclosures prompted Google to yank ShadyPanda Chrome extensions, Microsoft some Edge ones, but Edge laggards like WeTab persist as of early 2026, infecting anew. Firefox/Opera cleanups followed GhostPoster IOCs; no DarkSpectre arrests announced.

Browser giants tout improved behavioral monitoring, yet seven-year gaps expose flaws—reviews ignore sleepers. Koi’s Wings engine exemplifies fixes: continuous analysis catching post-approval shifts.

Protecting Yourself: Essential Steps for Users and Businesses

Scan extensions via tools like Koi or Shortwave; revoke broad permissions (all URLs, tabs) routinely. Enterprises: policy-block unknown extensions, monitor C2 IOCs (infinitynewtab.com, api.jt2x.com, etc.), deploy behavioral EDR.

Users: stick to verified devs, audit via chrome://extensions, use extension whitelists. Update browsers; consider containers isolating add-ons. For devs: minimize permissions, avoid sync storage for IDs.

The Bigger Picture: A Wake-Up Call for Browser Ecosystems

DarkSpectre’s 8.8M tally—5.6M ShadyPanda, 1M+ GhostPoster, 2.2M Zoom—proves marketplaces incentivize long-cons: trust signals aid scale, updates bypass gates. As AI aids obfuscation, expect copycats; 2026 forecasts more sleeper threats.

This saga demands overhaul: runtime vetting, user warnings on permissions, C2 blacklists. Until then, vigilance trumps convenience—your browser is the new battlefield


Subscribe to Our Newsletter

Related Articles

Top Trending

What Is The Sharing Economy
What Is The Sharing Economy: Borrowing Tools Instead Of Buying [Save Big]
How To Sell Notion Templates
Write Once, Sell Forever: How To Sell Notion Templates In 2026 [Profit Blueprint]
Why Local SaaS Hosting Matters More Than Ever
Data Sovereignty: Why Local SaaS Hosting Matters More Than Ever
10 Side Hustles You Can Start This Weekend with $0 and a Laptop
10 Side Hustles You Can Start This Weekend with $0 and a Laptop
How to Monetize Your Scroll Time on TikTok
From Viewer to Creator: How to Monetize Your "Scroll Time" on TikTok [The Ultimate Guide]

Fintech & Finance

high yield savings accounts in January 2026
Top 5 High-Yield Savings Accounts (HYSA) for January 2026
What Is Teen Banking
What Is Teen Banking: The Race To Capture The Gen Alpha Market [The Next Big Thing]
How to Conduct a SaaS Audit Cutting Bloat in Q1 2026
How To Conduct A SaaS Audit: Cutting Bloat In Q1 2026
The Evolution of DAOs Are They Replacing Corporations
The Evolution Of DAOs: Are They Replacing Corporations?
How Regular Credit Score Tracking with Bajaj Markets Helps Prevent Loan Rejection
How Regular Credit Score Tracking with Bajaj Markets Helps Prevent Loan Rejection

Sustainability & Living

What Is The Sharing Economy
What Is The Sharing Economy: Borrowing Tools Instead Of Buying [Save Big]
Net-Zero Buildings
Net-Zero Buildings: How To Achieve Zero Emissions [The Ultimate Pathway to a Greener Future]
Fusion Energy
Fusion Energy: Updates on the Holy Grail of Power [Revisiting The Perspective]
Tiny homes
Tiny Homes: A Solution to Homelessness or Poverty with Better Branding?
Smart Windows The Tech Saving Energy in 2026 Skyscrapers
Smart Windows: The Tech Saving Energy in 2026 Skyscrapers

GAMING

Monster Hunter Wilds Story Length
How Many Chapters Are In Monster Hunter Wilds? Story Length Guide
steam deck alternatives in 2026
Top 5 Handheld Consoles to Buy in 2026 (That Aren't the Steam Deck)
Game Preservation in the Digital Age What Happens When Servers Die
Game Preservation In The Digital Age: What Happens When Servers Die?
How Many Chapters in Monster Hunter Wilds
How Many Chapters in Monster Hunter Wilds: Breakdown of All 6 Story Chapters
Monster Hunter Wilds Co-Op
How To Play With Friends In Monster Hunter Wilds Co-Op Guide

Business & Marketing

How To Sell Notion Templates
Write Once, Sell Forever: How To Sell Notion Templates In 2026 [Profit Blueprint]
10 Side Hustles You Can Start This Weekend with $0 and a Laptop
10 Side Hustles You Can Start This Weekend with $0 and a Laptop
7 AI-First Side Hustles That Didn't Exist 6 Months Ago
7 "AI-First" Side Hustles That Didn't Exist 6 Months Ago
How to Conduct a SaaS Audit Cutting Bloat in Q1 2026
How To Conduct A SaaS Audit: Cutting Bloat In Q1 2026
Managing Gen Alpha Interns What Leaders Need to Know
Managing Gen Alpha Interns: What Leaders Need To Know

Technology & AI

Why Local SaaS Hosting Matters More Than Ever
Data Sovereignty: Why Local SaaS Hosting Matters More Than Ever
Prompt Engineering Is Dead Here Are the 4 Tech Skills Actually Paying
Prompt Engineering Is Dead: Here Are the 4 Tech Skills Actually Paying in 2026
high income skills
Stop Driving Uber: 5 High-Paying Digital Skills You Can Learn in a Weekend
7 AI-First Side Hustles That Didn't Exist 6 Months Ago
7 "AI-First" Side Hustles That Didn't Exist 6 Months Ago
steam deck alternatives in 2026
Top 5 Handheld Consoles to Buy in 2026 (That Aren't the Steam Deck)

Fitness & Wellness

Mental Health First Aid for Managers
Mental Health First Aid: A Mandatory Skill for 2026 Managers
The Quiet Wellness Movement Reclaiming Mental Focus in the Hyper-Digital Era
The “Quiet Wellness” Movement: Reclaiming Mental Focus in the Hyper-Digital Era
Cognitive Optimization
Brain Health is the New Weight Loss: The Rise of Cognitive Optimization
The Analogue January Trend Why Gen Z is Ditching Screens for 30 Days
The "Analogue January" Trend: Why Gen Z is Ditching Screens for 30 Days
Gut Health Revolution The Smart Probiotic Tech Winning CES
Gut Health Revolution: The "Smart Probiotic" Tech Winning CES