BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

DarkSpectre browser extensions steal meeting intel from 2.2M

DarkSpectre’s long‑running browser‑extension campaigns infected 8.8 million users to harvest meeting data and run affiliate/ad fraud, with infrastructure links to China.

  • DarkSpectre is linked to three browser-extension campaigns that together affected more than 8.8 million users over seven years.
  • The campaigns — ShadyPanda, GhostPoster and the “Zoom Stealer” — targeted Google Chrome, Microsoft Edge and Mozilla Firefox to steal data and commit affiliate and ad fraud.
  • Attackers used long-lived benign extensions, time-delayed triggers, and real-time data exfiltration to harvest meeting details and user information.
  • Evidence tying the actor to China includes Alibaba Cloud Hosting, ICP registrations in Chinese provinces, Chinese-language code artifacts, and fraud aimed at Chinese e-commerce sites.

Who: Security firm Koi Security has assessed the campaign cluster as the work of a threat actor tracked as DarkSpectre. The group ran three extension campaigns that impacted browsers worldwide over more than seven years. The activity affected over 8.8 million users in total.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

ShadyPanda operated across multiple browsers and hit about 5.6 million users. Operators deployed more than 100 connected extensions, including an Edge add-on that contained a time-delayed logic bomb — a short program that activates malicious behavior after a set condition. Many extensions acted as “dormant sleepers,” meaning they remain benign until malicious updates convert them.

GhostPoster focused largely on Firefox, distributing utilities and VPN tools that executed JavaScript to hijack affiliate links, inject trackers, and commit click and ad fraud. Investigators also found an Opera Google Translate extension (developer "charliesmithbons") with nearly one million installs linked to the cluster.

The third campaign, called the Zoom Stealer, used 18 extensions across Chrome, Edge and Firefox to collect meeting URLs (including embedded passwords), IDs, topics, times, registration status, participant lists and speaker details. The Malware exfiltrated data over WebSocket — a protocol for real-time, bidirectional web communication. These add-ons requested access to more than 28 conferencing platforms, such as Cisco WebEx, Google Meet, GoTo Webinar, Microsoft Teams and Zoom.

Investigators noted Chinese links including command-and-control servers on Alibaba Cloud, ICP registrations tied to provinces like Hubei, Chinese-language code artifacts, and fraud targeting platforms such as JD.com and Taobao. Researchers warned: "This isn’t consumer fraud – this is corporate espionage infrastructure." Additional visuals from the report are available (image) and related links (image) and (image).

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Epic Games Lays Off 1,000+

Epic Games is laying off over 1,000 employees, citing a significant decline in Fortnite...

Microsoft, Nvidia Deploy AI for Nuclear Development

Microsoft and NVIDIA have launched a joint AI initiative to accelerate nuclear energy project...

Theta’s AI Agents Now Respond in Tables & Buttons

Theta's EdgeCloud AI agents can now autonomously respond with rich UI components like tables...

BitGo, Susquehanna Offer Crypto OTC Prediction Market Trades

BitGo and Susquehanna Crypto have partnered to create the first institutional OTC offering for...

French Firms Targeted by Resume-Carrying Cryptomining Malware

A phishing campaign uses fake, obfuscated French-language resumes to deliver malware that mines cryptocurrency...

Must Read

How To Buy a Handshake Domain: A Step-by-Step Guide

Handshake Domains | Benefits | Drawbacks | How To Buy | Supported BrowsersIn this step-by-step guide, I am going to show you how to...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading