8.8m Browser Users Hit by Chinese Malware Operation

chinese malware operation

Cybersecurity researchers have exposed a massive malware campaign linked to a Chinese threat actor known as DarkSpectre, which has infected over 8.8 million users across Chrome, Edge, Firefox, and Opera browsers through malicious extensions. This sophisticated operation, spanning seven years, evolved from simple affiliate fraud to full-scale browser surveillance and corporate espionage, exploiting trusted browser marketplaces to build massive user bases before activating hidden backdoors.

The revelation, detailed in reports from Koi Security released in late December 2025, underscores vulnerabilities in extension review processes and highlights the risks of seemingly legitimate tools turning rogue via silent updates.

Unmasking DarkSpectre: The Mastermind Behind the Campaigns

DarkSpectre stands out for its operational maturity, running parallel campaigns with distinct playbooks tailored to different browsers and objectives, all while maintaining legitimate facades for years. Researchers connected the dots through shared infrastructure like domains such as infinitynewtab.com and api.jt2x.com, which powered benign features in extensions but linked to malicious command-and-control (C2) servers hosted on Alibaba Cloud in China.

Attribution to a Chinese operation relies on multiple indicators: ICP registrations tied to provinces like Hubei, Chinese-language code artifacts, and targeting of e-commerce giants JD.com and Taobao for affiliate fraud. Unlike opportunistic hackers, DarkSpectre demonstrates nation-state-level patience, investing in long-term trust-building across 300+ extensions before weaponization.

This isn’t isolated; it builds on earlier phases where the group tested marketplace weaknesses with wallpaper apps injecting affiliate codes on sites like Amazon and eBay. By late 2025, the actor controlled backdoors capable of arbitrary code execution, turning browsers into persistent surveillance tools.

ShadyPanda: The Flagship Surveillance Empire Infecting 5.6 Million

ShadyPanda forms the core of DarkSpectre’s operations, starting with 145 extensions in 2023 disguised as wallpaper and productivity apps that siphoned commissions from user clicks on major retailers. Evolving into search hijackers like Infinity V+, these tools redirected queries through suspicious domains like trovi.com, logging keystrokes and exfiltrating cookies to servers such as nossl.dergoodting.com.

The masterstroke came in mid-2024: five extensions, including “Featured” and “Verified” Clean Master with 200,000 installs, flipped malicious after years of clean operation, affecting 300,000 users with hourly RCE checks to api.extensionplay.com. These backdoors download obfuscated JavaScript—often disguised as PNGs—granting full browser access for keystroke logging, content injection, and MITM attacks, all while evading detection by hiding when developer tools open.

Parallel to this, five Starlab Technology extensions on Edge, led by WeTab with 3 million installs, actively spy on 4 million users, capturing every URL, search query, mouse click (with pixel precision), and page interaction, streaming data to 17 Chinese servers including Baidu and WeTab endpoints. Expansions revealed 100+ extensions, with 9 active, 85 dormant “sleepers,” pushing the ShadyPanda toll to 5.6 million.

GhostPoster: Stealthy Payloads Hidden in Images Target 1 Million

GhostPoster’s playbook exploits Firefox and Opera via steganography: malicious JavaScript embedded in PNG icon files, extracted post-install with 48-hour delays and 10% activation rates to dodge reviews. Affecting 1.05 million users across 18 extensions, it shares C2 domains like liveupdt.com with ShadyPanda, confirming unified control.

A shocking extension, “Google™ Translate” by charliesmithbons on Opera (nearly 1 million installs), strips site security, injects iframes for RCE, and disables anti-fraud on Chinese shopping links, phoning home to mitarchive.info and gmzdaily.com. This cross-marketplace agility—Chrome to Opera—highlights DarkSpectre’s platform mastery, turning trusted translation tools into backdoors.

The technique’s elegance lies in its review-proof nature: benign during submission, payload-loaded later, enabling affiliate hijacks and surveillance without triggering static scans.

Zoom Stealer: Corporate Espionage via 2.2 Million Meeting Harvesters

DarkSpectre’s most insidious campaign, the Zoom Stealer, targets corporate secrets through 18 extensions like “Twitter X Video Downloader” and “Chrome Audio Capture” (800,000 installs), requesting permissions for 28 platforms including Zoom, Teams, and WebEx. These “productivity” tools scrape webinar pages for links (with passwords), IDs, topics, and real-time participant data via WebSocket streams to zoocorder.firebaseio.com.

Beyond logistics, they build speaker dossiers—names, titles, bios, photos, companies—plus logos and attendance patterns, exfiltrating via Google Cloud Functions for a searchable intelligence database. Bridged by infinitynewtab.com to ShadyPanda, this 2.2 million-user op enables espionage: selling roadmap calls, sales intel, or phishing fodder like “Sarah from the webinar.”

Unlike consumer fraud, this fuels strategic attacks—M&A intel, competitor spying—exposing how browser permissions grant outsiders network-level access without AV alerts.

Technical Arsenal: From Obfuscation to Remote Control

DarkSpectre’s code employs layered evasion: custom XOR encoding, packed JS interpreters bypassing CSP, anti-debug tricks sensing dev tools, and config-driven payloads from C2s like api.jt2x.com dictating fraud targets or surveillance depth. RCE frameworks poll hourly for updates, executing anything from Taobao link swaps to credential theft.

WeTab exemplifies intrusiveness: keystroke-monitored searches, scroll-tracked sessions, fingerprinting surviving reinstalls via sync storage, all AES-encrypted to Chinese servers. Zoom tools use persistent WebSockets for live feeds, while GhostPoster PNG stego loads multi-stage payloads probabilistically.

This modularity—remote swaps sans updates—renders static reviews obsolete, as behaviors shift post-approval.

Chinese Ties and Broader Implications for Global Security

Infrastructure screams China: Alibaba-hosted C2s, Hubei ICPs, timezone-aligned commits, and e-commerce focus on domestic platforms. Whether state-sponsored or tolerated cybercrime, the scale demands resources beyond lone wolves, echoing past ops like Fireball (250M infections) but with espionage twists.

Victims span consumers (fraud) to enterprises (meeting leaks), with 20% corporate hit rates in prior analogs. Data monetization via sales intel, impersonation kits, or state intel sharing amplifies risks, especially amid rising supply-chain worries.

For regions like South Asia and Latin America—your publishing foci—this hits home: global browsers mean local users’ data flows to China, fueling targeted scams on emerging e-com.

How Victims Got Infected and What It Means Day-to-Day

Infection starts innocently: users grab “helpful” extensions from Chrome Web Store (badges boosting trust), Edge Add-ons, Firefox Marketplace, or Opera—often “Featured” after years of fakes. Auto-updates deliver payloads silently; no phishing needed.

Daily impacts: hijacked searches inflate affiliate costs, surveillance profiles for ads/phishing, corporate users leak secrets unwittingly. Enterprises face breached repos, SaaS logins; consumers lose privacy to pixel-tracked habits.

Official Responses: Removals, But Infrastructure Lingers

Koi’s disclosures prompted Google to yank ShadyPanda Chrome extensions, Microsoft some Edge ones, but Edge laggards like WeTab persist as of early 2026, infecting anew. Firefox/Opera cleanups followed GhostPoster IOCs; no DarkSpectre arrests announced.

Browser giants tout improved behavioral monitoring, yet seven-year gaps expose flaws—reviews ignore sleepers. Koi’s Wings engine exemplifies fixes: continuous analysis catching post-approval shifts.

Protecting Yourself: Essential Steps for Users and Businesses

Scan extensions via tools like Koi or Shortwave; revoke broad permissions (all URLs, tabs) routinely. Enterprises: policy-block unknown extensions, monitor C2 IOCs (infinitynewtab.com, api.jt2x.com, etc.), deploy behavioral EDR.

Users: stick to verified devs, audit via chrome://extensions, use extension whitelists. Update browsers; consider containers isolating add-ons. For devs: minimize permissions, avoid sync storage for IDs.

The Bigger Picture: A Wake-Up Call for Browser Ecosystems

DarkSpectre’s 8.8M tally—5.6M ShadyPanda, 1M+ GhostPoster, 2.2M Zoom—proves marketplaces incentivize long-cons: trust signals aid scale, updates bypass gates. As AI aids obfuscation, expect copycats; 2026 forecasts more sleeper threats.

This saga demands overhaul: runtime vetting, user warnings on permissions, C2 blacklists. Until then, vigilance trumps convenience—your browser is the new battlefield


Subscribe to Our Newsletter

Related Articles

Top Trending

Strait of Hormuz Blockade 2026
Chokepoint in Chaos: How the 2026 Strait of Hormuz Blockade is Rewriting Global Security and Energy
US Startups Engineering Lab-Grown Regenerative Fabrics
10 US Startups Engineering Lab-Grown Regenerative Fabrics for Everyday Wear
AI-Powered CRM Startups in the USA
20 AI-Powered CRM Startups in the USA Leading the 2026 Sales Revolution
Sweden work life balance
10 Surprising Facts About How Sweden's Work-Life Balance Culture Is Reshaping Mental Health Norms
how to curate a Digital Reading List
How To Curate A Digital Reading List That Builds Expertise: Transform Your Knowledge!

Fintech & Finance

Top Mobile Apps for Personal Finance Management
Top Mobile Apps for Personal Finance Management You Must Try
Top QuickBooks Errors Preventing Company File Access
Top 10 QuickBooks Errors Preventing Company File Access
Best Neobanks New Zealand 2025
9 Best Neobanks and Digital Finance Apps Available in New Zealand 2025
Irish Credit Union Digital Generation
7 Key Ways Irish Credit Unions Are Competing with Neobanks for the Digital Generation
How Fintech Is Transforming Emerging Market Economies
How Fintech Is Transforming Emerging Market Economies

Sustainability & Living

US Startups Engineering Lab-Grown Regenerative Fabrics
10 US Startups Engineering Lab-Grown Regenerative Fabrics for Everyday Wear
The Future of Fast Charging What's Coming Next
The Future of Fast Charging: Trends You Must Know
How Solid-State Batteries Will Change the EV Industry
How Solid-State Batteries Will Change The EV Industry
The Real Environmental Cost of Electric Vehicles
Hidden Environmental Impact of Electric Vehicles
How EV Battery Technology Is Evolving
EV Battery Technology in 2026: Key Innovations Driving Change

GAMING

What Most Users Still Get Wrong When Comparing CS2 Skin Platforms
What Most Users Still Get Wrong When Comparing CS2 Skin Platforms?
How Technology Is Transforming the Online Gaming Industry
How Technology Is Transforming the Online Gaming Industry
Naruto Uzumaki In The Manga
Naruto Uzumaki In The Manga: How The Original Source Material Shaped The Character
Online Game
Why Online Game Promotions Make Digital Entertainment More Engaging
Geek Appeal of Randomized Games
The Geek Appeal of Randomized Games Like Pokies

Business & Marketing

Trade Show Exhibit Trends 2026: Custom, Rental & Portable Designs That Steal the Spotlight
Trade Show Exhibit Trends 2026: Custom, Rental & Portable Designs That Steal the Spotlight
China EV Market Dominance: How China Leads Global EV Growth
How China Is Dominating The Global EV Market
Top 10 Productivity Apps for Remote Workers
10 Essential Remote Work Productivity Tools You Should Use
Emerging E-Commerce Markets
Top Emerging Markets for E-Commerce Entrepreneurs
Top Mobile Apps for Personal Finance Management
Top Mobile Apps for Personal Finance Management You Must Try

Technology & AI

AI-Powered CRM Startups in the USA
20 AI-Powered CRM Startups in the USA Leading the 2026 Sales Revolution
Dark Mode Web Design
How Dark Mode Is Becoming A Standard Web Design Feature
Best CI/CD Tools
The Best CI/CD Tools For Software Development Teams [The Ultimate Guide]
How to Build a Portfolio Website That Gets You Hired
Job-Winning Portfolio Website Tips to Get You Hired in 2026
Top 10 Productivity Apps for Remote Workers
10 Essential Remote Work Productivity Tools You Should Use

Fitness & Wellness

Best fitness apps in India
Sweat Goes Digital: 10 Indian Health Tech Apps Rewriting the Workout Rulebook
AI Personal Trainer Startups UK
10 UK AI Personal Trainer Startups Redefining Home Fitness: Get Fit Smarter!
Biogenic Luxury
The Rise of Biogenic Luxury: Ancestral Wisdom for the High-Performance Professional
cost of untreated mental health on productivity
10 Eye-Opening Facts About the Real Cost of Untreated Mental Health Conditions on American Productivity
British Men's Mental Health 2026
7 Key Facts About How British Men Are Finally Starting to Talk About Mental Health — And Why It Matters