Malicious Chrome Extensions Steal AI Chats From 900,000 Users

malicious chrome extensions steal ai chats

Over 9 million Chrome and Edge users have had their private AI conversations stolen by malicious browser extensions disguised as productivity tools, with both campaigns involving Google-featured extensions that secretly exfiltrated ChatGPT, DeepSeek, and other AI chat data to remote servers.

Dual Security Breaches Target AI Users

Two separate malware campaigns have exposed a critical vulnerability in browser extension security, compromising millions of users who trusted Google’s vetting process. Security researchers from OX Security and Koi Security independently uncovered the sophisticated data theft operations that specifically targeted private conversations with artificial intelligence platforms.​

The first campaign, discovered by OX Security on December 29, 2025, affected approximately 900,000 Chrome users through two malicious extensions that impersonated the legitimate AITOPIA AI assistant plugin. The second campaign, revealed by Koi Security in mid-December 2025, compromised over 8 million users across Chrome and Microsoft Edge through VPN and ad-blocking extensions that had been secretly harvesting AI chats since July 2025.​

The 900,000-User Attack

OX Security’s investigation revealed two malicious extensions that cloned the legitimate AITOPIA Chrome extension to evade detection. The extensions “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” accumulated 600,000 installations, while “AI Sidebar with Deepseek, ChatGPT, Claude, and more” reached 300,000 installations.​

Both extensions received Google’s “Featured” badge on the Chrome Web Store, a designation intended to signal compliance with security best practices. The malware mimicked AITOPIA’s user interface and functionality so precisely that users experienced no noticeable disruption while their data was being exfiltrated.​

The attackers manipulated Chrome’s permissions system by requesting access under the pretense of collecting “anonymous, non-identifiable analytics,” which they exploited for widespread surveillance. Once installed, the extensions assigned each user a unique identifier and began monitoring browser activity, specifically targeting visits to ChatGPT and DeepSeek platforms.​

How the Data Theft Operated

The malicious extensions employed sophisticated techniques to harvest sensitive information. They scraped chat content directly from the Document Object Model (DOM) using Chrome’s tabs.onUpdated API to capture conversation data and all active tab URLs. This exposed users’ browsing habits, research keywords, and potentially sensitive query parameters.​

The stolen data was encoded in Base64 format and transmitted to command-and-control servers at deepaichats[.]com and chatsaigpt[.]com every 30 minutes. The extensions cached data locally before batch-uploading it to attacker-controlled infrastructure hosted on Lovable, complicating attribution efforts.​

In a particularly insidious persistence mechanism, uninstalling one malicious extension automatically opened a browser tab suggesting installation of the other extension, ensuring continued access to user data.​

The 8 Million-User VPN Campaign

The larger campaign, affecting over 8 million users, involved multiple extensions from publisher Urban Cybersecurity. The primary extension, Urban VPN Proxy, had accumulated more than 6 million Chrome installations and 1.3 million Edge installations before researchers discovered its malicious functionality.​

Seven additional extensions from the same publisher contained identical data harvesting code, including 1ClickVPN Proxy, Urban Browser Guard, and Urban Ad Blocker. These extensions also carried “Featured” labels on browser stores, significantly increasing user trust.​

The malicious behavior was introduced through version 5.5.0, released on July 9, 2025, and deployed via automatic updates without user awareness. The extensions were particularly deceptive because they were marketed as privacy and security tools, with Chrome Web Store listings describing the product as protecting users from entering personal information into AI chatbots.​

Targeted AI Platforms

The VPN campaign monitored conversations across ten major AI platforms:​

AI Platform Data Collected
ChatGPT (OpenAI) Full prompts, responses, conversation IDs
Google Gemini User queries and AI responses
Anthropic Claude Complete conversation threads
Microsoft Copilot Prompts and generated content
Perplexity Search queries and AI answers
DeepSeek Chat interactions and metadata
Grok (xAI) User inputs and outputs
Meta AI Conversation data and timestamps

Technical Exploitation Method

When users opened AI chat platforms in their browsers, the extensions injected platform-specific JavaScript executors directly into web pages. These scripts overrode key browser network APIs, including fetch() and XMLHttpRequest, to intercept AI prompts, responses, conversation IDs, timestamps, and session metadata before browser encryption secured them.​

The captured data was then transmitted to remote analytics endpoints controlled by the extension operator or affiliated data brokers. The interception occurred at the network layer, allowing the extensions to capture data regardless of whether their advertised protection features were enabled.​

Google’s Response and Ongoing Risks

OX Security reported their findings to Google on December 29, 2025. However, as of December 30, 2025, both extensions from the 900,000-user campaign remained publicly available on the Chrome Web Store, with the most popular variant still displaying Google’s “Featured” badge.​

This incident raises serious questions about Google’s extension vetting process, particularly the criteria for awarding “Featured” status to extensions that later prove malicious. The presence of multiple malicious extensions bearing security endorsements suggests systematic failures in the review process.​

Privacy and Security Implications

Both campaigns represent sophisticated attacks on an increasingly sensitive category of data: AI conversations. Users frequently share confidential information with AI assistants, including proprietary business strategies, personal health concerns, legal questions, and financial data.​

The extensions captured not only AI chat content but also session tokens that could potentially grant attackers access to user accounts. For enterprise users, the theft of internal corporate information discussed in AI conversations poses significant competitive intelligence and data breach risks.​

The harvested browsing URLs and search parameters expose detailed user behavior patterns, research interests, and potentially identifying information embedded in URL query strings. This comprehensive surveillance capability extends far beyond the stated functionality of productivity or privacy tools.​

Protecting Against Extension-Based Attacks

Security experts recommend several precautions for browser extension users. Users should carefully review permissions requested by extensions, particularly those requiring “Read and change all your data on all websites” access. This permission level grants extensions complete visibility into all browser activity, including rendered web page content.​

Even extensions with high ratings and “Featured” badges require scrutiny, as both campaigns demonstrated that these endorsements do not guarantee security. Users should verify extension publishers, check for suspicious permission requests, and regularly audit installed extensions for unnecessary or excessive access rights.​

Organizations should implement browser extension whitelisting policies and educate employees about the risks of installing unvetted extensions, particularly on devices used for sensitive work.​

Final Thoughts

The dual browser extension campaigns affecting over 9 million users represent a significant escalation in data theft targeting AI platform users. The sophisticated impersonation techniques, exploitation of trusted security badges, and specific focus on AI conversations indicate that threat actors recognize the value of this emerging data category.​

The persistence of malicious extensions on official browser stores days after disclosure suggests ongoing risk for users who have not manually removed affected extensions. Both campaigns demonstrate that traditional security indicators like store ratings, featured badges, and high installation counts provide insufficient protection against determined attackers.​

As AI platforms become increasingly integrated into personal and professional workflows, browser extension security will require enhanced scrutiny from both platform providers and users. The incidents underscore the critical need for improved extension vetting processes, mandatory security audits for featured extensions, and greater transparency about data collection practices.


Subscribe to Our Newsletter

Related Articles

Top Trending

Best Open-Access Academic Databases
The Best Open-Access Academic Databases For Free Research
ADA compliant website
How to Make Your Website ADA Accessible
Strengthen Immune System
How to Strengthen Your Immune System Year-Round
Everything You Need to Know About Intermittent Fasting
Everything You Need to Know About Intermittent Fasting
resolving CORS Errors
How to Resolve CORS Errors In Web Applications: Step-by-Step Process

Fintech & Finance

EU's Preferred Fintech Licensing Gateway
10 Reasons Why Ireland Is the EU's Preferred Fintech Licensing Gateway in 2025
Top Mobile Apps for Personal Finance Management
Top Mobile Apps for Personal Finance Management You Must Try
Top QuickBooks Errors Preventing Company File Access
Top 10 QuickBooks Errors Preventing Company File Access
Best Neobanks New Zealand 2025
9 Best Neobanks and Digital Finance Apps Available in New Zealand 2025
Irish Credit Union Digital Generation
7 Key Ways Irish Credit Unions Are Competing with Neobanks for the Digital Generation

Sustainability & Living

dutch Closed-Loop and Waterless Dyeing companies
10 Dutch Tech Companies Revolutionizing Closed-Loop and Waterless Dyeing
US Startups Engineering Lab-Grown Regenerative Fabrics
10 US Startups Engineering Lab-Grown Regenerative Fabrics for Everyday Wear
The Future of Fast Charging What's Coming Next
The Future of Fast Charging: Trends You Must Know
How Solid-State Batteries Will Change the EV Industry
How Solid-State Batteries Will Change The EV Industry
The Real Environmental Cost of Electric Vehicles
Hidden Environmental Impact of Electric Vehicles

GAMING

What Most Users Still Get Wrong When Comparing CS2 Skin Platforms
What Most Users Still Get Wrong When Comparing CS2 Skin Platforms?
How Technology Is Transforming the Online Gaming Industry
How Technology Is Transforming the Online Gaming Industry
Naruto Uzumaki In The Manga
Naruto Uzumaki In The Manga: How The Original Source Material Shaped The Character
Online Game
Why Online Game Promotions Make Digital Entertainment More Engaging
Geek Appeal of Randomized Games
The Geek Appeal of Randomized Games Like Pokies

Business & Marketing

Trade Show Exhibit Trends 2026: Custom, Rental & Portable Designs That Steal the Spotlight
Trade Show Exhibit Trends 2026: Custom, Rental & Portable Designs That Steal the Spotlight
China EV Market Dominance: How China Leads Global EV Growth
How China Is Dominating The Global EV Market
Top 10 Productivity Apps for Remote Workers
10 Essential Remote Work Productivity Tools You Should Use
Emerging E-Commerce Markets
Top Emerging Markets for E-Commerce Entrepreneurs
Top Mobile Apps for Personal Finance Management
Top Mobile Apps for Personal Finance Management You Must Try

Technology & AI

ADA compliant website
How to Make Your Website ADA Accessible
resolving CORS Errors
How to Resolve CORS Errors In Web Applications: Step-by-Step Process
Best Frontend Framework 2026: React vs Vue vs Angular Guide
Learn React vs Vue vs Angular: Best Choice for Beginners
React 'Cannot Read Property Of Undefined' Error
How to Fix React 'Cannot Read Property of Undefined' Error? Unlock Solutions!
multilingual website development
Building Multi-Language Websites: A Complete Guide

Fitness & Wellness

Strengthen Immune System
How to Strengthen Your Immune System Year-Round
Everything You Need to Know About Intermittent Fasting
Everything You Need to Know About Intermittent Fasting
Smart Underwear
Smart Underwear Is Watching You. And You Let It
daily exercises for lower back pain
The Best Exercises for People With Lower Back Pain
AI Personal Trainer Startups US
Ditch the Human Coach? 10 AI Fitness Apps Conquering the US Market