BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Malicious Chrome Extensions Steal Credentials via Proxy Traffic

Phantom Shuttle: Malicious Chrome Extensions Steal Credentials via Man-in-the-Middle Proxy Attacks Disguised as VPN Services

  • Two malicious Google Chrome extensions named Phantom Shuttle intercept user traffic and steal credentials.
  • The extensions use a subscription model charging between $1.40 and $13.50 for a supposed VPN service.
  • User traffic to over 170 targeted domains is routed through attacker-controlled proxies to enable man-in-the-middle data theft.
  • The extensions continuously exfiltrate user credentials and session data to a command-and-control server.
  • The operation shows signs of being China-based, using Chinese language and payment methods like Alipay and WeChat Pay.

Two Google Chrome extensions named Phantom Shuttle, published by the same developer, have been identified to contain malicious capabilities that intercept network traffic and capture sensitive user credentials. One version has been available since November 2017 with about 2,000 users, and a second variant released in April 2023 has 180 users so far.

- Advertisement -

Advertised as a multi-location network speed test plug-in targeting developers and foreign trade professionals, these extensions operate under a subscription service charging from $1.40 to $13.50. Despite their VPN-like appearance, the extensions perform malicious activities, including man-in-the-middle attacks facilitated through traffic interception and credential injection, according to security researcher Kush Pandya as mentioned in the research report.

After subscription payment, users receive VIP status, triggering the automatic activation of a "smarty" proxy mode. This mode routes traffic from over 170 high-value websites—including developer platforms like GitHub and Stack Overflow, cloud services such as Amazon Web Services and Microsoft Azure, enterprise solutions, social media, and adult content sites—through threat actor-controlled proxy servers.

The extensions modify two JavaScript libraries bundled with the add-ons to inject hardcoded proxy credentials automatically on authentication requests, bypassing any user prompts. This process happens via Chrome’s webRequest API, allowing synchronous credential injection without user interaction. Once authenticated, the extensions set Chrome’s proxy configuration using a Proxy Auto-Configuration (PAC) script, supporting three modes: disabling proxy, routing all traffic, or selective routing based on the target domains list.

Traffic routed through these proxies is continuously monitored and manipulated by the attacker. The extensions send a 60-second “heartbeat” signal to their command-and-control server at phantomshuttle[.]space, transmitting the VIP user’s email, plaintext password, and extension version every five minutes. This facilitates ongoing credential theft and session observation.

- Advertisement -

The exfiltration targets critical personal data such as passwords, credit card numbers, authentication cookies, browsing histories, form inputs, API keys, and access tokens. The theft of developer secrets also opens the door to potential supply chain attacks. The presence of Chinese language text in descriptions, integration of Chinese payment methods like Alipay and WeChat Pay, and Hosting infrastructure tied to Alibaba Cloud suggest the operation originates from China.

Users who have installed these extensions are strongly advised to remove them immediately. Enterprises should implement extension allowlisting, monitor for extensions combining subscription payments with proxy permissions, and enable network-level detection of suspicious proxy authentications to mitigate such risks.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Ex-FTX engineer Nishad Singh fined $3.7 million

Former FTX head of engineering Nishad Singh settled a Commodity Futures Trading Commission (CFTC)...

Tether’s Jesse Spiro to Chair $100M Crypto Super PAC

Tether's Head of Government Affairs, Jesse Spiro, will chair the crypto-funded Fellowship PAC ahead...

CERT-UA Impersonated, New RAT Attack Hits Ukraine

The Computer Emergency Response Team of Ukraine (CERT-UA) was impersonated in a phishing campaign...

Binance Launches Oil and Gas Futures with 100x Leverage

Binance has officially launched trading for oil and natural gas futures contracts, completing its...

Franklin Templeton Buys 250 Digital to Launch Crypto Unit

Franklin Templeton is establishing a dedicated crypto unit, Franklin Crypto, through the acquisition of...

Must Read

What is Moon Tropica (CAH) – Technology, Tokenomics, Game Preview

Gaming enthusiasts and crypto enthusiasts, hHave you heard about Moon Tropica? If you're longing for that nostalgic feel of classic games from your childhood...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading