Widely Used Malicious Extensions Steal ChatGPT, DeepSeek Conversations
嗯,用户让我用中文总结一下这篇文章,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我得快速浏览一下文章内容。文章讲的是两个恶意浏览器扩展程序,伪装成合法工具,被安装了超过90万次。这些扩展程序窃取用户的浏览数据和与AI模型(如ChatGPT和DeepSeek)的对话内容。OX Security的研究人员发现了这个情况,详细描述了这些扩展如何窃取数据,并将数据发送到远程服务器。这些被窃取的信息包括源代码、商业策略、个人身份信息等敏感内容,可能被用于企业间谍活动或身份盗窃。 接下来,我需要把这些关键点浓缩到100字以内。重点包括:恶意扩展、伪装成合法工具、窃取数据和对话、影响范围大、潜在风险如企业间谍和身份盗窃。 然后,组织语言,确保简洁明了。比如:“两个伪装成合法工具的恶意浏览器扩展被安装超90万次,窃取用户浏览数据及与AI模型对话内容。研究人员发现这些扩展将数据发送至远程服务器,可能用于企业间谍活动或身份盗窃。” 检查一下字数是否在限制内,并且没有使用禁止的开头词。 </think> 两个伪装成合法工具的恶意浏览器扩展被安装超90万次,窃取用户浏览数据及与AI模型对话内容。研究人员发现这些扩展将数据发送至远程服务器,可能用于企业间谍活动或身份盗窃。 2025-12-30 18:33:59 Author: securityboulevard.com(查看原文) 阅读量:3 收藏

Two malicious extensions made to look like a legitimate tool and installed more than 900,000 times were used by bad actors to steal users’ browsing data and their conversations with AI models like ChatGPT and DeepSeek.

The two extensions – Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI (which has more than 600,000 users and carries Google’s “Featured” badge) and AI Sidebar with Deepseek, ChatGPT, Claude and more (300,000-plus users) – exfiltrate user conversations and all Chrome tab URLs every 30 minutes and sends the data to a remote command-and-control (C2) server controlled by the threat actors, according to researchers with OX Security.

Among the information exposed in the AI conversations are proprietary source code and development queries shared with ChatGPT or DeepSeek, business strategies, competitive intelligence, and strategic planning discussions, personal identifiable information (PII) disclosed during conversations, and confidential research, legal matters, and sensitive corporate communications, OX Security researchers Moshe Siman and Tov Bustan wrote in a report this week.

Stolen browser history data includes not only the complete URLs from all Chrome tabs, but also search queries containing sensitive keywords and research topics, URL parameters that could contain session tokens, user IDs, and authentication data, and internal corporate URLs revealing organizational structure and tools.

“This data can be weaponized for corporate espionage, identity theft, targeted phishing campaigns, or sold on underground forums,” Siman and Bustan wrote. “Organizations whose employees installed these extensions may have unknowingly exposed intellectual property, customer data, and confidential business information.”

Extensions are Being Weaponized

The discovery by OX Security adds to a growing list of incidents involving bad actors using seemingly legitimate malicious extensions placed in online marketplaces to expose and steal sensitive information. Koi Security, earlier this month, wrote of another malicious Chrome extension that was used by more than 6 million people that collected every user prompt and chatbot response in 10 of the most popular AI large language models (LLMs), including OpenAI’s ChatGPT, Google’s Gemini, Anthropic’s Claude, and Microsoft’s Copilot.

Also in December, Koi researchers reported on a threat group called ShadyPanda, which, for seven years, uploaded legitimate extensions onto browser marketplaces, building trust and a following before quietly deploying malicious updates.

There have been other reports this year of browser extensions in both Google Chrome and Microsoft Edge web stores that bad actors initially placed legitimate and working extensions before later weaponizing them through malicious updates.

Extensions are used to improve and customize users’ browsing experience. More people are using browsers, which can expand the attack surface of the individual and the companies they work for, according to security experts.

“Browser extensions aren’t niche tools anymore; they’re deeply embedded in how people work,” Grip Security researchers Ben Robertson and Guy Katzir wrote earlier this year. “But that convenience comes with risk, especially when security teams don’t have visibility into what’s installed, what it can access, or how it behaves after login. The attack surface has shifted. And while endpoint agents and network controls still matter, they can’t see what’s happening inside the browser. That’s where threats like token hijacking and data leakage quietly take shape.”

Impersonating AITOPIA’s Extension

In the most recent case, the hackers created malicious extensions that impersonated a legitimate browser created by a company called AITOPIA. The extension puts a sidebar onto any website to give users the ability to chat with popular AI LLMs, OX Security’s Siman and Bustan wrote.

In the malicious extensions, the bad actors included the same functionality of AITOPIA’s AI sidebar extension, but then included malware that steals ChatGPT and DeepSeek conversations from the browser.

“This approach serves two purposes: It makes the malicious extensions appear functional and useful (increasing download rates), while the familiar AITOPIA interface masks the malicious activity occurring in the background,” they wrote. “The malware leverages broad ‘read all website content’ permissions to monitor user browsing activity. When a user visits ChatGPT or DeepSeek, the extension identifies active conversation pages and extracts both user prompts and AI responses in real-time.”

The stolen data is stored in a local database on the victim’s system and then is stolen in batches to the C2 server. The malware asks the user for permission to collect anonymized browser behavior. If permission is granted, the extension automatically listens for events like URLs that are visited and ChatGPT and DeepSeek chats.

Keeping a Foot in the Door

The hackers developed a clever way to ensure that one or the other malicious extensions are running on the victims’ systems.

“When one of the extensions is uninstalled, it opens the other malicious extension inside a new tab, to trick users into installing the other extension instead,” Siman and Bustan wrote. “In order to hide their activities, the threat actors set up the privacy policy and uninstall redirection websites using the vibe coding tool Lovable, making it hard to traceback the creators of the websites.”

The OX Security researchers wrote that they notified Google about both malicious extensions on December 29, and that the Google team responded the next day by saying they were reviewing the issue.

Recent Articles By Author


文章来源: https://securityboulevard.com/2025/12/widely-used-malicious-extensions-steal-chatgpt-deepseek-conversations/
如有侵权请联系:admin#unsafe.sh