đź“° Full Story
Security researchers at Socket disclosed on April 15, 2026, a coordinated campaign of 108 malicious Google Chrome extensions that together have around 20,000 installs on the Chrome Web Store.
The add-ons, published under five developer identities (Yana Project, GameGen, SideGames, Rodeo Games and InterAlt), report to a common command-and-control backend (cloudapi[.]stream) and carry a mix of malicious behaviors.
Fifty-four extensions harvest Google OAuth2 identity data, 45 contain a persistent backdoor that can open arbitrary URLs at browser start, and several strip security headers to inject ads into YouTube and TikTok.
The most severe sample repeatedly exfiltrates active Telegram Web sessions every 15 seconds, enabling full account access without passwords or MFA. Socket has submitted takedown requests to Google and Chrome Web Store security teams; many extensions remained live at the time of reporting.
Researchers warn the operation resembles a malware-as-a-service model, with some code comments suggesting Russian-language origins, but no definitive attribution has been made.
Users are urged to audit installed extensions, remove any listed by Socket, revoke suspicious Google app access, and terminate other Telegram Web sessions if they used the flagged Telegram add-ons.







đź’¬ Commentary