Malicious Browser Extension
What is Malicious Browser Extension?
Malicious Browser ExtensionA browser add-on that abuses its host permissions to steal credentials, hijack sessions, inject ads, or exfiltrate user data, often through compromised updates of legitimate extensions.
Malicious browser extensions are add-ons (Chrome, Edge, Firefox, Safari) that abuse the broad permissions extensions are typically granted — read/modify all sites, access cookies, capture network requests, inject content scripts — to perform attacks far beyond a normal web page. Common patterns include credential and cookie theft, session hijacking, ad injection, search-engine hijacking, cryptominer drop, and exfiltration of corporate SaaS data. Extensions often turn malicious through supply-chain attacks: a developer's account is compromised, an extension is sold to a malicious actor, or a benign dependency is replaced. Defenses include allow-listing extensions in enterprises, monitoring permission changes, using Manifest V3 origin restrictions, and removing unused extensions.
● Examples
- 01
A popular extension is sold and updated to inject affiliate links and steal session cookies.
- 02
An OAuth-flow extension exfiltrates Gmail tokens to an attacker-controlled server.
● Frequently asked questions
What is Malicious Browser Extension?
A browser add-on that abuses its host permissions to steal credentials, hijack sessions, inject ads, or exfiltrate user data, often through compromised updates of legitimate extensions. It belongs to the Application Security category of cybersecurity.
What does Malicious Browser Extension mean?
A browser add-on that abuses its host permissions to steal credentials, hijack sessions, inject ads, or exfiltrate user data, often through compromised updates of legitimate extensions.
How does Malicious Browser Extension work?
Malicious browser extensions are add-ons (Chrome, Edge, Firefox, Safari) that abuse the broad permissions extensions are typically granted — read/modify all sites, access cookies, capture network requests, inject content scripts — to perform attacks far beyond a normal web page. Common patterns include credential and cookie theft, session hijacking, ad injection, search-engine hijacking, cryptominer drop, and exfiltration of corporate SaaS data. Extensions often turn malicious through supply-chain attacks: a developer's account is compromised, an extension is sold to a malicious actor, or a benign dependency is replaced. Defenses include allow-listing extensions in enterprises, monitoring permission changes, using Manifest V3 origin restrictions, and removing unused extensions.
How do you defend against Malicious Browser Extension?
Defences for Malicious Browser Extension typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Malicious Browser Extension?
Common alternative names include: Browser extension malware, Rogue extension.
● Related terms
- appsec№ 129
Browser Sandbox
An OS-level isolation layer that confines a browser's renderer and helper processes so that compromised web code cannot read the file system or other applications.
- attacks№ 1116
Supply Chain Attack
An attack that compromises a trusted third-party software, hardware, or service provider in order to reach its downstream customers.
- attacks№ 1016
Session Hijacking
An attack that takes over a victim's authenticated session by stealing or forging the session identifier so the attacker can act as the user without their credentials.
- attacks№ 219
Cookie Hijacking
Theft and reuse of a user's HTTP cookies — typically session or authentication cookies — to impersonate that user against a web application.
- malware№ 1083
Spyware
Malware that secretly collects information about a user, device, or organization and sends it to an external party.
- malware№ 019
Adware
Software that automatically displays, injects, or redirects to advertisements, often bundled with free software and frequently tracking user behavior.