Malicious Chrome Extensions Steal AI Chats From 900,000 Users

malicious chrome extensions steal ai chats

Over 9 million Chrome and Edge users have had their private AI conversations stolen by malicious browser extensions disguised as productivity tools, with both campaigns involving Google-featured extensions that secretly exfiltrated ChatGPT, DeepSeek, and other AI chat data to remote servers.

Dual Security Breaches Target AI Users

Two separate malware campaigns have exposed a critical vulnerability in browser extension security, compromising millions of users who trusted Google’s vetting process. Security researchers from OX Security and Koi Security independently uncovered the sophisticated data theft operations that specifically targeted private conversations with artificial intelligence platforms.​

The first campaign, discovered by OX Security on December 29, 2025, affected approximately 900,000 Chrome users through two malicious extensions that impersonated the legitimate AITOPIA AI assistant plugin. The second campaign, revealed by Koi Security in mid-December 2025, compromised over 8 million users across Chrome and Microsoft Edge through VPN and ad-blocking extensions that had been secretly harvesting AI chats since July 2025.​

The 900,000-User Attack

OX Security’s investigation revealed two malicious extensions that cloned the legitimate AITOPIA Chrome extension to evade detection. The extensions “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” accumulated 600,000 installations, while “AI Sidebar with Deepseek, ChatGPT, Claude, and more” reached 300,000 installations.​

Both extensions received Google’s “Featured” badge on the Chrome Web Store, a designation intended to signal compliance with security best practices. The malware mimicked AITOPIA’s user interface and functionality so precisely that users experienced no noticeable disruption while their data was being exfiltrated.​

The attackers manipulated Chrome’s permissions system by requesting access under the pretense of collecting “anonymous, non-identifiable analytics,” which they exploited for widespread surveillance. Once installed, the extensions assigned each user a unique identifier and began monitoring browser activity, specifically targeting visits to ChatGPT and DeepSeek platforms.​

How the Data Theft Operated

The malicious extensions employed sophisticated techniques to harvest sensitive information. They scraped chat content directly from the Document Object Model (DOM) using Chrome’s tabs.onUpdated API to capture conversation data and all active tab URLs. This exposed users’ browsing habits, research keywords, and potentially sensitive query parameters.​

The stolen data was encoded in Base64 format and transmitted to command-and-control servers at deepaichats[.]com and chatsaigpt[.]com every 30 minutes. The extensions cached data locally before batch-uploading it to attacker-controlled infrastructure hosted on Lovable, complicating attribution efforts.​

In a particularly insidious persistence mechanism, uninstalling one malicious extension automatically opened a browser tab suggesting installation of the other extension, ensuring continued access to user data.​

The 8 Million-User VPN Campaign

The larger campaign, affecting over 8 million users, involved multiple extensions from publisher Urban Cybersecurity. The primary extension, Urban VPN Proxy, had accumulated more than 6 million Chrome installations and 1.3 million Edge installations before researchers discovered its malicious functionality.​

Seven additional extensions from the same publisher contained identical data harvesting code, including 1ClickVPN Proxy, Urban Browser Guard, and Urban Ad Blocker. These extensions also carried “Featured” labels on browser stores, significantly increasing user trust.​

The malicious behavior was introduced through version 5.5.0, released on July 9, 2025, and deployed via automatic updates without user awareness. The extensions were particularly deceptive because they were marketed as privacy and security tools, with Chrome Web Store listings describing the product as protecting users from entering personal information into AI chatbots.​

Targeted AI Platforms

The VPN campaign monitored conversations across ten major AI platforms:​

AI Platform Data Collected
ChatGPT (OpenAI) Full prompts, responses, conversation IDs
Google Gemini User queries and AI responses
Anthropic Claude Complete conversation threads
Microsoft Copilot Prompts and generated content
Perplexity Search queries and AI answers
DeepSeek Chat interactions and metadata
Grok (xAI) User inputs and outputs
Meta AI Conversation data and timestamps

Technical Exploitation Method

When users opened AI chat platforms in their browsers, the extensions injected platform-specific JavaScript executors directly into web pages. These scripts overrode key browser network APIs, including fetch() and XMLHttpRequest, to intercept AI prompts, responses, conversation IDs, timestamps, and session metadata before browser encryption secured them.​

The captured data was then transmitted to remote analytics endpoints controlled by the extension operator or affiliated data brokers. The interception occurred at the network layer, allowing the extensions to capture data regardless of whether their advertised protection features were enabled.​

Google’s Response and Ongoing Risks

OX Security reported their findings to Google on December 29, 2025. However, as of December 30, 2025, both extensions from the 900,000-user campaign remained publicly available on the Chrome Web Store, with the most popular variant still displaying Google’s “Featured” badge.​

This incident raises serious questions about Google’s extension vetting process, particularly the criteria for awarding “Featured” status to extensions that later prove malicious. The presence of multiple malicious extensions bearing security endorsements suggests systematic failures in the review process.​

Privacy and Security Implications

Both campaigns represent sophisticated attacks on an increasingly sensitive category of data: AI conversations. Users frequently share confidential information with AI assistants, including proprietary business strategies, personal health concerns, legal questions, and financial data.​

The extensions captured not only AI chat content but also session tokens that could potentially grant attackers access to user accounts. For enterprise users, the theft of internal corporate information discussed in AI conversations poses significant competitive intelligence and data breach risks.​

The harvested browsing URLs and search parameters expose detailed user behavior patterns, research interests, and potentially identifying information embedded in URL query strings. This comprehensive surveillance capability extends far beyond the stated functionality of productivity or privacy tools.​

Protecting Against Extension-Based Attacks

Security experts recommend several precautions for browser extension users. Users should carefully review permissions requested by extensions, particularly those requiring “Read and change all your data on all websites” access. This permission level grants extensions complete visibility into all browser activity, including rendered web page content.​

Even extensions with high ratings and “Featured” badges require scrutiny, as both campaigns demonstrated that these endorsements do not guarantee security. Users should verify extension publishers, check for suspicious permission requests, and regularly audit installed extensions for unnecessary or excessive access rights.​

Organizations should implement browser extension whitelisting policies and educate employees about the risks of installing unvetted extensions, particularly on devices used for sensitive work.​

Final Thoughts

The dual browser extension campaigns affecting over 9 million users represent a significant escalation in data theft targeting AI platform users. The sophisticated impersonation techniques, exploitation of trusted security badges, and specific focus on AI conversations indicate that threat actors recognize the value of this emerging data category.​

The persistence of malicious extensions on official browser stores days after disclosure suggests ongoing risk for users who have not manually removed affected extensions. Both campaigns demonstrate that traditional security indicators like store ratings, featured badges, and high installation counts provide insufficient protection against determined attackers.​

As AI platforms become increasingly integrated into personal and professional workflows, browser extension security will require enhanced scrutiny from both platform providers and users. The incidents underscore the critical need for improved extension vetting processes, mandatory security audits for featured extensions, and greater transparency about data collection practices.


Subscribe to Our Newsletter

Related Articles

Top Trending

How to Earn Passive Income Without Trading
How to Earn Passive Income Without Trading in a Volatile Market
How to Make Profits With Digital Drop-Servicing
How to Make Profits With Digital Drop-Servicing: A Guide to Earn Big in 2026
Witch Hunt
The Witch Hunt: Why Momoka’s Game Was the Ultimate Test of Trust [Not Intelligence]
Justice For Karube And Chota
Justice For Karube And Chota: Did They Have To Die For Arisu To Evolve?
15 Best AI Productivity Tools for Remote Teams in 2026
15 Best AI Productivity Tools for Remote Teams in 2026

Fintech & Finance

How to Earn Passive Income Without Trading
How to Earn Passive Income Without Trading in a Volatile Market
high yield savings accounts in January 2026
Top 5 High-Yield Savings Accounts (HYSA) for January 2026
What Is Teen Banking
What Is Teen Banking: The Race To Capture The Gen Alpha Market [The Next Big Thing]
How to Conduct a SaaS Audit Cutting Bloat in Q1 2026
How To Conduct A SaaS Audit: Cutting Bloat In Q1 2026
The Evolution of DAOs Are They Replacing Corporations
The Evolution Of DAOs: Are They Replacing Corporations?

Sustainability & Living

What Is The Sharing Economy
What Is The Sharing Economy: Borrowing Tools Instead Of Buying [Save Big]
Net-Zero Buildings
Net-Zero Buildings: How To Achieve Zero Emissions [The Ultimate Pathway to a Greener Future]
Fusion Energy
Fusion Energy: Updates on the Holy Grail of Power [Revisiting The Perspective]
Tiny homes
Tiny Homes: A Solution to Homelessness or Poverty with Better Branding?
Smart Windows The Tech Saving Energy in 2026 Skyscrapers
Smart Windows: The Tech Saving Energy in 2026 Skyscrapers

GAMING

Is Monster Hunter Wilds Open World
Is Monster Hunter Wilds An Open World Game? The Map & Regions Explained
Monster Hunter Wilds Story Length
How Many Chapters Are In Monster Hunter Wilds? Story Length Guide
steam deck alternatives in 2026
Top 5 Handheld Consoles to Buy in 2026 (That Aren't the Steam Deck)
Game Preservation in the Digital Age What Happens When Servers Die
Game Preservation In The Digital Age: What Happens When Servers Die?
How Many Chapters in Monster Hunter Wilds
How Many Chapters in Monster Hunter Wilds: Breakdown of All 6 Story Chapters

Business & Marketing

How to Make Profits With Digital Drop-Servicing
How to Make Profits With Digital Drop-Servicing: A Guide to Earn Big in 2026
15 Best AI Productivity Tools for Remote Teams in 2026
15 Best AI Productivity Tools for Remote Teams in 2026
Side Hustles to Avoid
5 Popular Side Hustles That Are A Complete Waste of Time in 2026
Digital Drop-Servicing is the King of 2026
Forget Dropshipping: Why "Digital Drop-Servicing" Is The King Of 2026
How To Sell Notion Templates
Write Once, Sell Forever: How To Sell Notion Templates In 2026 [Profit Blueprint]

Technology & AI

15 Best AI Productivity Tools for Remote Teams in 2026
15 Best AI Productivity Tools for Remote Teams in 2026
best free SaaS tools
Work, Wealth, And Wellness: 50 Best Free SAAS Tools to Optimize Your Life in 2026
Why Local SaaS Hosting Matters More Than Ever
Data Sovereignty: Why Local SaaS Hosting Matters More Than Ever
Prompt Engineering Is Dead Here Are the 4 Tech Skills Actually Paying
Prompt Engineering Is Dead: Here Are the 4 Tech Skills Actually Paying in 2026
high income skills
Stop Driving Uber: 5 High-Paying Digital Skills You Can Learn in a Weekend

Fitness & Wellness

Mental Health First Aid for Managers
Mental Health First Aid: A Mandatory Skill for 2026 Managers
The Quiet Wellness Movement Reclaiming Mental Focus in the Hyper-Digital Era
The “Quiet Wellness” Movement: Reclaiming Mental Focus in the Hyper-Digital Era
Cognitive Optimization
Brain Health is the New Weight Loss: The Rise of Cognitive Optimization
The Analogue January Trend Why Gen Z is Ditching Screens for 30 Days
The "Analogue January" Trend: Why Gen Z is Ditching Screens for 30 Days
Gut Health Revolution The Smart Probiotic Tech Winning CES
Gut Health Revolution: The "Smart Probiotic" Tech Winning CES