Categories: Cyber Security News

Fake TikTok Downloader Extensions Infect 130,000 Browser Users

A large-scale browser extension campaign has compromised more than 130,000 users by disguising malicious tools as TikTok video downloaders, according to researchers at LayerX Security.

The operation targeted users on both Google Chrome and Microsoft Edge marketplaces, with around 12,500 infections still active.

The attackers published at least 12 extensions that appeared legitimate, using names such as “TikTok Video Downloader” and “Mass TikTok Downloader.”

Instead of building each extension separately, the threat actors relied on a shared codebase, allowing them to quickly clone and rebrand applications.

When one extension was removed by store moderators, a nearly identical version was uploaded with the same descriptions and visuals, ensuring continuous availability.

Notably, several of these malicious extensions managed to obtain “Featured” status in official extension stores.

This badge, typically associated with trusted and vetted applications, significantly increased user confidence and download rates, amplifying the campaign’s reach.

Dynamic Evasion Techniques

The campaign’s sophistication lies in its use of dynamic remote configuration. All extensions were built using Manifest V3 (MV3) and retrieved operational instructions from attacker-controlled servers after installation.

This allowed threat actors to modify behavior in real time without triggering store security checks.

Through this mechanism, attackers could:

  • Activate malicious features after installation
  • Modify data collection settings without user consent
  • Redirect traffic to suspicious or malicious domains
  • Expand surveillance capabilities dynamically

To avoid early detection, the extensions initially behaved as advertised for several months. Only after gaining user trust and a large install base did the attackers remotely enable tracking and data harvesting functions.

Once activated, the extensions began collecting detailed telemetry to build unique user fingerprints.

The data gathered included browsing patterns, download metadata, system language, timezone, and even battery status, an unusual metric that can help uniquely identify devices.

This level of tracking enables persistent user identification across sessions, raising serious privacy and security concerns.

The operation relied on external JSON-based configuration files hosted on attacker-controlled domains.

These domains used typosquatting techniques, such as “trafficreqort.com” and “tiktak,” to appear legitimate and evade detection by both users and automated tools.

Although no specific threat group has been attributed, the coordinated infrastructure and consistent codebase suggest a well-organized and persistent actor.

This campaign highlights a critical weakness in browser security models, which primarily focus on initial extension validation.

Since these malicious tools activate harmful behavior post-installation, they bypass traditional defenses.

Because browser extensions operate within authenticated sessions, they can potentially access sensitive data and may even be leveraged for larger attacks, including botnet deployment.

Security experts recommend adopting continuous monitoring strategies that detect abnormal behavior, including suspicious network requests, unauthorized permission changes, and unusual DOM interactions, to mitigate evolving extension-based threats.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post Fake TikTok Downloader Extensions Infect 130,000 Browser Users appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Historic North Leverett Sawmill seeks $391K for vital repairs

LEVERETT — Various structural repairs to the North Leverett Sawmill, work that needs to be…

4 minutes ago

New Hadley town administrator begins May 11

HADLEY — Nathaniel Malloy of South Deerfield will begin his responsibilities as Hadley’s next town…

4 minutes ago

Fundraiser set up for Leverett family displaced by fire

LEVERETT — An online fundraiser is underway to assist a family who lost their home…

4 minutes ago

A Look Back, April 21

50 Years Ago Gretchen Ziegler of Cummington was recently appointed executive director of the Highland…

5 minutes ago

South Hadley honors Revolutionary War veterans at Patriots’ Day ceremony

SOUTH HADLEY — The rights listed in the Declaration of Independence did not apply to…

6 minutes ago

This website uses cookies.