Categories: Cyber Security News

ShadyPanda Malware Hits 4.3 Million Chrome and Edge Users in a 7-Year Stealth Attack

A newly identified threat actor dubbed “ShadyPanda” has conducted a seven-year browser extension campaign that compromised at least 4.3 million Chrome and Edge users, turning trusted add-ons into surveillance and remote-control tools.

Researchers at Koi Security uncovered multiple coordinated operations that abused official extension marketplaces, including extensions featured and verified by Google, giving the attackers instant credibility and a massive reach.

RCE backdoor and seven-year buildup

In the most dangerous operation, ShadyPanda weaponized five long-standing extensions, including the “Featured” and “Verified” Clean Master, into a remote code execution (RCE) backdoor affecting over 300,000 users.

Initially benign since 2018–2019, these extensions operated legitimately for years to gain users and trust before receiving a malicious update in mid-2024 that turned them into hourly-controlled implants.

Every infected browser now checks an attacker-controlled server (api.extensionplay[.]com) every hour, downloads arbitrary JavaScript, and executes it with full browser API access, effectively giving ShadyPanda a persistent backdoor.

Clean master – the malware that was featured by google

The current payload monitors every website visit, collecting URLs, referrers, timestamps, persistent UUIDs synced across devices, and complete browser fingerprints, then encrypts the data with AES and exfiltrates it to api.cleanmasters.store.

The extensions deploy heavy obfuscation, anti-analysis behavior that turns off malicious functions when developer tools are open, and even a large embedded JavaScript interpreter to evade Content Security Policy.

At the same time, a service worker layer enables man-in-the-middle attacks, content injection, credential theft, and session hijacking over HTTPS.

Even after marketplace removal, the malicious infrastructure remains active on any browser where the extensions are still installed.

Spyware empire and systemic marketplace failure

Alongside the RCE backdoor, ShadyPanda runs a larger spyware operation via five Microsoft Edge extensions published by Starlab Technology, which together have over 4 million installs and remain live in the Edge Add-ons store.

The flagship extension, WeTab 新标签页 (WeTab New Tab Page), with around 3 million installs, tracks every URL visited, all search queries at keystroke level, mouse clicks with pixel precision, browser fingerprints, page interaction data, and storage access, sending data to 17 domains, including multiple Baidu and WeTab servers in China plus Google Analytics.

With broad permissions to access all URLs and cookies, these extensions can be silently updated at any time, allowing ShadyPanda to deploy the same hourly RCE backdoor used in Phase 3 or escalate to targeted espionage and account takeover.

Koi’s analysis traces ShadyPanda’s evolution through four phases: from 2023, when it used 145 “wallpaper” and productivity extensions to hijack e-commerce traffic, to early 2024, when it engaged in search hijacking and cookie exfiltration via extensions like Infinity V+, and finally to long-term trust-building followed by weaponization.

The core weakness exploited in every phase is the marketplace trust model itself: static review at submission, minimal behavioral monitoring afterward, and automatic trusted updates that can instantly convert millions of legitimate installs into a distributed surveillance and RCE platform.

Koi positions its behavioral monitoring and risk-scoring platform as a countermeasure, emphasizing continuous observation of what extensions actually do after installation rather than relying on claims and one-time reviews.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post ShadyPanda Malware Hits 4.3 Million Chrome and Edge Users in a 7-Year Stealth Attack appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

For All Mankind Season 5, Episode 4 Review – “Open Source”

Full spoilers follow for For All Mankind Season 5, Episode 4, which is streaming on…

2 minutes ago

Animated Border Glow Effect In Vanilla JavaScript – Border Beam Vanilla

Border Beam Vanilla is a Vanilla JavaScript library that decorates DOM elements with animated traveling…

1 hour ago

Add A Colorful Christmas Tree to Your Console – ctree.js

ctree.js is a fun little JavaScript library that generates a colorful Christmas tree right in…

1 hour ago

Privacy Study Finds Chrome Fingerprinting and Header Leaks Can Expose Users

A comprehensive review of browser privacy in 2026 reveals that Google Chrome remains highly vulnerable…

2 hours ago

Ambassador Bridge Cuts Select Tolls Ahead of New Competition

DETROIT, MI (WOWO) A competitive shift is underway on the Detroit River as the operator…

2 hours ago

EU’s New Age Verification App Can Be Hacked Within 2 Minutes, Researchers Claim

The European Commission’s newly launched Digital Age Verification App, unveiled on April 14, 2026, to…

2 hours ago

This website uses cookies.