Contacts
Book a Meet
Close

Contacts

Bulgaria, Kavarna
Saudi Arabia, Riyadh

+359 875 328030

sales@diamatix.com

DarkSpectre Campaign Infected Over 8.8 Million Users via Malicious Browser Extensions

56

DarkSpectre Campaign Infected Over 8.8 Million Users via Malicious Browser Extensions

Cybersecurity researchers have uncovered DarkSpectre, a long-running and highly coordinated threat operation that infected more than 8.8 million users of Google Chrome, Microsoft Edge, and Mozilla Firefox through seemingly legitimate browser extensions.

The investigation reveals that DarkSpectre has been active for at least seven years, operating at a level of sophistication more commonly associated with state-scale or well-resourced criminal groups.

Three campaigns, one operator

Researchers linked three major campaigns to a single threat actor:

  • ShadyPanda – approx. 5.6 million users

  • Zoom Stealer – approx. 2.2 million users

  • GhostPoster – approx. 1.05 million users

Infrastructure overlap, shared domains, and consistent payload delivery mechanisms confirmed that these campaigns are not independent, but part of one unified operation.

Dormant extensions and delayed activation

A defining feature of DarkSpectre is its long-term persistence strategy. Extensions maintained legitimate functionality for years before being weaponized, allowing them to build trust and pass marketplace reviews.

Some extensions delayed malicious activity for days or weeks after installation, effectively bypassing security checks during the review process.

Advanced evasion techniques

Researchers documented multiple advanced techniques:

  • Time-bomb activation

  • Partial execution on a small percentage of page loads

  • Steganographic payloads hidden in PNG images

  • Server-controlled JavaScript delivery, enabling real-time behavior changes without extension updates

This architecture gives attackers exceptional flexibility while minimizing exposure.

Impact and risk

Once activated, affected extensions can:

  • inject malicious scripts;

  • harvest browsing data;

  • facilitate fraud and tracking;

  • act as an initial access vector for broader attacks.

The case highlights browser extensions as a critical but often overlooked supply-chain risk, including in enterprise environments.

DIAMATIX Perspective

DarkSpectre underscores the need to treat browser extensions as software assets, not conveniences. Effective defense requires:

  • strict extension allow-listing;

  • behavioral monitoring;

  • continuous review of long-standing extensions;

  • awareness that longevity does not equal trust.


Sources:

  • Koi Security – technical investigation and attribution

  • CybersecurityNews – initial reporting

  • Corroborating infrastructure analysis shared by independent researchers

Contact DIAMATIX

Trusted · Innovative · Vigilant

Subscribe for latest updates & insights

Please enable JavaScript in your browser to complete this form.