Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing Data

Related

CISOs and Security Leaders to Watch in Australian Media and Entertainment

Cybersecurity in media and entertainment has quietly become one...

Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

What happened A security vulnerability in the Moltbook AI agent...

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing Data

What happened Socket researchers uncovered multiple malicious Chrome extensions that...

NationStates Confirms Data Breach and Temporarily Shuts Down Game Site

What happened NationStates confirmed a data breach after unauthorized remote...

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

What happened A cyber espionage campaign attributed to an Iran-linked...

Share

What happened

Socket researchers uncovered multiple malicious Chrome extensions that abused affiliate links and exfiltrated user data. Some extensions replaced existing affiliate codes with attacker-controlled links, while others injected scripts into ChatGPT pages to steal authentication tokens. The extensions appeared legitimate in the Chrome Web Store, attracting installs before hidden behaviors were identified.

Who is affected

Users who installed the malicious extensions were affected through affiliate fraud, data exfiltration, and session hijacking.

Why CISOs should care

Browser extensions remain a high-risk vector for credential theft and data misuse in enterprise environments.

3 practical actions

  • Audit browser extensions. Remove unverified or unnecessary add-ons.
  • Monitor token handling. Restrict browser-based storage of sensitive tokens.
  • Inspect affiliate behavior. Detect unauthorized URL modifications.