8.8m Browser Users Hit by Chinese Malware Operation

chinese malware operation

Cybersecurity researchers have exposed a massive malware campaign linked to a Chinese threat actor known as DarkSpectre, which has infected over 8.8 million users across Chrome, Edge, Firefox, and Opera browsers through malicious extensions. This sophisticated operation, spanning seven years, evolved from simple affiliate fraud to full-scale browser surveillance and corporate espionage, exploiting trusted browser marketplaces to build massive user bases before activating hidden backdoors.

The revelation, detailed in reports from Koi Security released in late December 2025, underscores vulnerabilities in extension review processes and highlights the risks of seemingly legitimate tools turning rogue via silent updates.

Unmasking DarkSpectre: The Mastermind Behind the Campaigns

DarkSpectre stands out for its operational maturity, running parallel campaigns with distinct playbooks tailored to different browsers and objectives, all while maintaining legitimate facades for years. Researchers connected the dots through shared infrastructure like domains such as infinitynewtab.com and api.jt2x.com, which powered benign features in extensions but linked to malicious command-and-control (C2) servers hosted on Alibaba Cloud in China.

Attribution to a Chinese operation relies on multiple indicators: ICP registrations tied to provinces like Hubei, Chinese-language code artifacts, and targeting of e-commerce giants JD.com and Taobao for affiliate fraud. Unlike opportunistic hackers, DarkSpectre demonstrates nation-state-level patience, investing in long-term trust-building across 300+ extensions before weaponization.

This isn’t isolated; it builds on earlier phases where the group tested marketplace weaknesses with wallpaper apps injecting affiliate codes on sites like Amazon and eBay. By late 2025, the actor controlled backdoors capable of arbitrary code execution, turning browsers into persistent surveillance tools.

ShadyPanda: The Flagship Surveillance Empire Infecting 5.6 Million

ShadyPanda forms the core of DarkSpectre’s operations, starting with 145 extensions in 2023 disguised as wallpaper and productivity apps that siphoned commissions from user clicks on major retailers. Evolving into search hijackers like Infinity V+, these tools redirected queries through suspicious domains like trovi.com, logging keystrokes and exfiltrating cookies to servers such as nossl.dergoodting.com.

The masterstroke came in mid-2024: five extensions, including “Featured” and “Verified” Clean Master with 200,000 installs, flipped malicious after years of clean operation, affecting 300,000 users with hourly RCE checks to api.extensionplay.com. These backdoors download obfuscated JavaScript—often disguised as PNGs—granting full browser access for keystroke logging, content injection, and MITM attacks, all while evading detection by hiding when developer tools open.

Parallel to this, five Starlab Technology extensions on Edge, led by WeTab with 3 million installs, actively spy on 4 million users, capturing every URL, search query, mouse click (with pixel precision), and page interaction, streaming data to 17 Chinese servers including Baidu and WeTab endpoints. Expansions revealed 100+ extensions, with 9 active, 85 dormant “sleepers,” pushing the ShadyPanda toll to 5.6 million.

GhostPoster: Stealthy Payloads Hidden in Images Target 1 Million

GhostPoster’s playbook exploits Firefox and Opera via steganography: malicious JavaScript embedded in PNG icon files, extracted post-install with 48-hour delays and 10% activation rates to dodge reviews. Affecting 1.05 million users across 18 extensions, it shares C2 domains like liveupdt.com with ShadyPanda, confirming unified control.

A shocking extension, “Google™ Translate” by charliesmithbons on Opera (nearly 1 million installs), strips site security, injects iframes for RCE, and disables anti-fraud on Chinese shopping links, phoning home to mitarchive.info and gmzdaily.com. This cross-marketplace agility—Chrome to Opera—highlights DarkSpectre’s platform mastery, turning trusted translation tools into backdoors.

The technique’s elegance lies in its review-proof nature: benign during submission, payload-loaded later, enabling affiliate hijacks and surveillance without triggering static scans.

Zoom Stealer: Corporate Espionage via 2.2 Million Meeting Harvesters

DarkSpectre’s most insidious campaign, the Zoom Stealer, targets corporate secrets through 18 extensions like “Twitter X Video Downloader” and “Chrome Audio Capture” (800,000 installs), requesting permissions for 28 platforms including Zoom, Teams, and WebEx. These “productivity” tools scrape webinar pages for links (with passwords), IDs, topics, and real-time participant data via WebSocket streams to zoocorder.firebaseio.com.

Beyond logistics, they build speaker dossiers—names, titles, bios, photos, companies—plus logos and attendance patterns, exfiltrating via Google Cloud Functions for a searchable intelligence database. Bridged by infinitynewtab.com to ShadyPanda, this 2.2 million-user op enables espionage: selling roadmap calls, sales intel, or phishing fodder like “Sarah from the webinar.”

Unlike consumer fraud, this fuels strategic attacks—M&A intel, competitor spying—exposing how browser permissions grant outsiders network-level access without AV alerts.

Technical Arsenal: From Obfuscation to Remote Control

DarkSpectre’s code employs layered evasion: custom XOR encoding, packed JS interpreters bypassing CSP, anti-debug tricks sensing dev tools, and config-driven payloads from C2s like api.jt2x.com dictating fraud targets or surveillance depth. RCE frameworks poll hourly for updates, executing anything from Taobao link swaps to credential theft.

WeTab exemplifies intrusiveness: keystroke-monitored searches, scroll-tracked sessions, fingerprinting surviving reinstalls via sync storage, all AES-encrypted to Chinese servers. Zoom tools use persistent WebSockets for live feeds, while GhostPoster PNG stego loads multi-stage payloads probabilistically.

This modularity—remote swaps sans updates—renders static reviews obsolete, as behaviors shift post-approval.

Chinese Ties and Broader Implications for Global Security

Infrastructure screams China: Alibaba-hosted C2s, Hubei ICPs, timezone-aligned commits, and e-commerce focus on domestic platforms. Whether state-sponsored or tolerated cybercrime, the scale demands resources beyond lone wolves, echoing past ops like Fireball (250M infections) but with espionage twists.

Victims span consumers (fraud) to enterprises (meeting leaks), with 20% corporate hit rates in prior analogs. Data monetization via sales intel, impersonation kits, or state intel sharing amplifies risks, especially amid rising supply-chain worries.

For regions like South Asia and Latin America—your publishing foci—this hits home: global browsers mean local users’ data flows to China, fueling targeted scams on emerging e-com.

How Victims Got Infected and What It Means Day-to-Day

Infection starts innocently: users grab “helpful” extensions from Chrome Web Store (badges boosting trust), Edge Add-ons, Firefox Marketplace, or Opera—often “Featured” after years of fakes. Auto-updates deliver payloads silently; no phishing needed.

Daily impacts: hijacked searches inflate affiliate costs, surveillance profiles for ads/phishing, corporate users leak secrets unwittingly. Enterprises face breached repos, SaaS logins; consumers lose privacy to pixel-tracked habits.

Official Responses: Removals, But Infrastructure Lingers

Koi’s disclosures prompted Google to yank ShadyPanda Chrome extensions, Microsoft some Edge ones, but Edge laggards like WeTab persist as of early 2026, infecting anew. Firefox/Opera cleanups followed GhostPoster IOCs; no DarkSpectre arrests announced.

Browser giants tout improved behavioral monitoring, yet seven-year gaps expose flaws—reviews ignore sleepers. Koi’s Wings engine exemplifies fixes: continuous analysis catching post-approval shifts.

Protecting Yourself: Essential Steps for Users and Businesses

Scan extensions via tools like Koi or Shortwave; revoke broad permissions (all URLs, tabs) routinely. Enterprises: policy-block unknown extensions, monitor C2 IOCs (infinitynewtab.com, api.jt2x.com, etc.), deploy behavioral EDR.

Users: stick to verified devs, audit via chrome://extensions, use extension whitelists. Update browsers; consider containers isolating add-ons. For devs: minimize permissions, avoid sync storage for IDs.

The Bigger Picture: A Wake-Up Call for Browser Ecosystems

DarkSpectre’s 8.8M tally—5.6M ShadyPanda, 1M+ GhostPoster, 2.2M Zoom—proves marketplaces incentivize long-cons: trust signals aid scale, updates bypass gates. As AI aids obfuscation, expect copycats; 2026 forecasts more sleeper threats.

This saga demands overhaul: runtime vetting, user warnings on permissions, C2 blacklists. Until then, vigilance trumps convenience—your browser is the new battlefield


Subscribe to Our Newsletter

Related Articles

Top Trending

how to Cook Restaurant-Quality Meals at home
The Secret to Restaurant-Quality Meals: The Ultimate Guide to Gourmet Home Cooking!
Australian Local SEO
15 Things Most People Don't Know About Australian Local SEO
understanding Attachment Styles
Understanding Attachment Styles And How They Affect Relationships!
On This Day May 10
On This Day May 10: History, Famous Birthdays, Deaths & Global Events
Motherhood Penalty
Modern Motherhood Penalty: Why Mother’s Day 2026 is the Global Breaking Point for Working Mothers 

Fintech & Finance

best canadian travel credit cards 2026
8 Best Canadian Credit Cards for Travel Rewards Compared in 2026
How to Use a Balance Transfer to Pay Off Debt Faster
Pay Off Debt Faster with a Smart Balance Transfer
Best High-Yield Savings Accounts Now
Best High-Yield Savings Accounts Of 2026
Best Australian Credit Cards 2026
8 Best Australian Credit Cards for Points and Cashback in 2026
Klarna global expansion
12 Key Facts About Klarna's Global Expansion

Sustainability & Living

Solar Panels Increase Home Resale Value
How Solar Panels Affect Your Home's Resale Value
Solar vs Coal
How Solar Energy Is Becoming Cheaper Than Coal
UK Blockchain Food Traceability Startups
12 UK Blockchain Solutions Ensuring Complete Farm-to-Fork Traceability
EV Adoption in Australia
13 Critical Facts About EV Adoption in Australia
Non-Toxic Home Finishes UK
10 UK Startups Revolutionizing Home Renovations with Non-Toxic Finishes

GAMING

How Cloud Gaming Is Changing Mobile Experiences
How Cloud Gaming Is Changing Mobile Experiences
The Rise of Hyper-Casual Games What's Driving Downloads
Hyper-Casual Games Growth: Key Drivers Behind Massive Downloads
M&A in Gaming
Top 10 SMEs Specializing in M&A in Gaming in USA
Top 10 SMEs Specializing in Game Engines
Top 10 SMEs Specializing in Game Engines in the United States of America
Gaming Audio Design & Music
Top 10 SMEs Specializing in Gaming Audio Design & Music in US

Business & Marketing

Investing in Nordic stock exchanges
10 Practical Tips for Investing in Nordic Stock Exchanges
Best High-Yield Savings Accounts Now
Best High-Yield Savings Accounts Of 2026
How To Conduct Performance Reviews That Actually Motivate
How To Conduct Performance Reviews That Actually Motivate
Why American Football Still Dominates Sports Culture Across The United States
Why American Football Still Dominates Sports Culture Across The United States
How To Run Effective Team Meetings That Don't Waste Time
How To Run Effective Team Meetings That Don't Waste Time: Maximize Your Productivity!

Technology & AI

GDPR compliant web design
15 Practical Tips for GDPR-Compliant Web Design
How to Build a Scalable App Architecture from Day One
Scalable App Architecture Strategies for Modern Startups
Why Most SaaS Startups Have a Strategy Gap and the Tools Closing It
Why Most SaaS Startups Have a Strategy Gap — and the Tools Closing It
Aya vs Google Translate
Aya vs Google Translate in 2026: Which AI Actually Understands Your Language
Mobile Game Psychology: How Developers Hook Players Fast
How Mobile Game Developers Hook Players With Psychology

Fitness & Wellness

understanding Attachment Styles
Understanding Attachment Styles And How They Affect Relationships!
Digital Fitness Apps in Germany
Digital Fitness Apps in Germany: 15 Startups Turning Phones Into Personal Trainers 
modern therapy misconceptions
Why Therapy Is Still Misunderstood And How To Find The Right Help
Physical Symptoms of Grieving: How It Works
Physical Symptoms of Grieving: How It Works And Why There's No Shortcut Through It
Gamified Fitness Startups in UK
15 UK’s Most Influential Gamified Fitness Startups and SMEs