Categories: Cyber Security News

GhostPoster Malware Campaign Targets Chrome Users via 17 Malicious Extensions

A sophisticated malware campaign dubbed “GhostPoster” has infiltrated major browser extension stores, compromising over 840,000 users across Chrome, Firefox, and Edge through 17 malicious extensions that evaded detection for more than four years.
Firefox extension available for download in store (source:layerxsecurity)

Security researchers uncovered the operation after identifying a complex multi-stage infection chain that employs steganography, delayed execution, and modular payload delivery to maintain persistence while generating revenue through affiliate fraud and click manipulation.

The GhostPoster malware demonstrates advanced operational security through its initial payload delivery mechanism.

Rather than using conventional script injection, the threat actor embeds malicious code within the binary data of extension icon files, typically PNG images.

When users install what appears to be legitimate browser utilities, such as ad blockers, screenshot tools, or language translators, the extension extracts hidden bytecode from the image file during runtime.

This extraction process searches for specific byte delimiters represented as the ASCII string ‘>>>>’ and decodes all subsequent data as executable JavaScript.

The technique effectively bypasses static analysis tools that scan only traditional code paths, as the malicious payload exists as what appears to be innocent image metadata.

Delayed execution represents another critical evasion strategy. The malware implements mandatory waiting periods ranging from 48 hours to five days before initiating command-and-control communication.

This behavioral-detection system for dormancy countermeasures flags immediate network activity after installation.

Upon activation, the extracted loader contacts remote servers to retrieve additional JavaScript modules that enable the malware’s core functionality.

These capabilities include stripping security headers like Content Security Policy and HTTP Strict Transport Security, hijacking affiliate marketing traffic for financial gain, injecting fraudulent iframes for click fraud, programmatically solving CAPTCHA challenges, and tracking user browsing patterns for extended surveillance.

The campaign’s infrastructure reveals systematic cross-platform distribution. Researchers at Koi Security traced the malicious network to 17 confirmed extensions, with the threat actor initially targeting Microsoft Edge users in 2020 before expanding to Firefox and Chrome.

The extensions collectively amassed 840,000 installations, with the most prolific variant, “Google Translate in Right Click,” infecting 522,398 Chrome users alone.

Other high-impact extensions included “Translate Selected Text with Google” (159,645 installs), “Floating Player  PiP Mode” (40,824 installs), and “Ads Block Ultimate” (48,078 installs), demonstrating the attackers’ preference for utilities with broad appeal.

A more advanced variant discovered during the LayerX Security investigation exhibited enhanced modularity.

This version embedded its payload within the extension’s background script rather than its content scripts, using the same PNG steganography technique and storing the decoded payloads in the browser’s local storage under obfuscated keys.

Decoding and saving in local storage (source:layerxsecurity)

The five-day activation delay and ability to fetch updated payloads from remote servers indicate a mature operational framework designed for long-term resilience against both automated scanning and manual takedown efforts.

Decoded. Png payload. (source:layerxsecurity)

Mozilla’s and Microsoft’s store removal actions are only partially practical due to the malware’s persistence mechanism.

Extensions already installed on user systems remain active unless manually uninstalled, creating an ongoing security gap.

This limitation underscores fundamental challenges in browser extension security, where reactive takedowns cannot retroactively neutralize threats that have already been deployed.

Indicators of Compromise

Extension ID Name Installs
maiackahflfnegibhinjhpbgeoldeklb Page Screenshot Clipper 86
kjkhljbbodkfgbfnhjfdchkjacdhmeaf Full Page Screenshot 2,000
ielbkcjohpgmjhoiadncabphkglejgih Convert Everything 17,171
obocpangfamkffjllmcfnieeoacoheda Translate Selected Text with Google 159,645
dhnibdhcanplpdkcljgmfhbipehkgdkk Youtube Download 11,458
gmciomcaholgmklbfangdjkneihfkddd RSS Feed 2,781
fbobegkkdmmcnmoplkgdmfhdlkjfelnb Ads Block Ultimate 48,078
onlofoccaenllpjmalbnilfacjmcfhfk AdBlocker 10,155
bmmchpeggdipgcobjbkcjiifgjdaodng Color Enhancer 712
knoibjinlbaolannjalfdjiloaadnknj Floating Player – PiP Mode 40,824
jihipmfmicjjpbpmoceapfjmigmemfam One Key Translate 10,785
ajbkmeegjnmaggkhmibgckapjkohajim Cool Cursor 2,254
fcoongackakfdmiincikmjgkedcgjkdp Google Translate in Right Click 522,398
fmchencccolmmgjmaahfhpglemdcjfll Translate Selected Text with Right Click 283
amazon-price-history Amazon Price History 1,197
save-image-to-pinterest Save Image to Pinterest on Right Click 6,517
instagram-downloading Instagram Downloader 3,807

Security teams should audit installed extensions across managed environments, particularly those outside organizational policy controls.

Behavior-based monitoring solutions capable of detecting unauthorized network activity and suspicious DOM manipulation represent essential defensive layers against similar threats.

Tactic Technique
Defense Evasion Masquerading as legitimate utilities (T1036)
Defense Evasion Code obfuscation via steganography (T1140)
Defense Evasion Delayed execution to evade detection (T1678)
Defense Evasion Evading server-side store checks
Discovery Browser information gathering (T1217)

The GhostPoster campaign serves as a critical reminder that browser extension ecosystems remain viable attack vectors for sophisticated threat actors prioritizing stealth and persistence over rapid proliferation.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post GhostPoster Malware Campaign Targets Chrome Users via 17 Malicious Extensions appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

New Dawn of War 4 Adeptus Mechanicus Trailer

Upcoming RTS Dawn of War 4 has a new CGI trailer to reveal the Adeptus…

10 minutes ago

Wolfhound Preview: An 8-Bit Throwback That Has Clearly Studied the Classics

You like Wolfhound, but Wolfhound does not like you. I’m going to write about 1,180…

10 minutes ago

Splatoon Raiders Release Date Confirmed

Switch 2 exclusive Splatoon Raiders will arrive in July, Nintendo has announced. The Splatoon spinoff…

10 minutes ago

I Am Legend 2 Update

It appears I Am Legend 2 is moving forward at Warner Bros., with reports indicating…

11 minutes ago

Hackers Use Nightmare-Eclipse Tools After Compromising FortiGate SSL VPN Access

A real-world intrusion campaign leveraging publicly available Nightmare-Eclipse privilege escalation tooling, BlueHammer, RedSun, and UnDefend,…

16 minutes ago

Gentlemen RaaS Attacking Windows, Linux With additional locker written in C for ESXi

A new ransomware-as-a-service (RaaS) operation known as “The Gentlemen” has emerged as a serious threat…

16 minutes ago

This website uses cookies.