Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Shadypanda Extensions Hit Millions Users

December 2, 2025
Reading Time: 3 mins read
in Alerts
Glassworm Malware Strikes Again In VS Code

The long-running malicious operation known as “ShadyPanda” has successfully amassed over 4.3 million installations of browser extensions for Chrome and Edge. Discovered by Koi Security, this operation unfolded through distinct phases where initially legitimate-appearing browser extensions progressively received updates introducing increasingly severe malicious functions, effectively turning them into sophisticated spyware. The campaign encompasses 145 unique extensions—20 on Chrome and 125 on Edge—dating back to 2018. Although Google has since removed all related extensions from the Chrome Web Store, the campaign’s extensions remain active on the Microsoft Edge Add-ons platform, including one extension alone that is currently listed with an astonishing three million installs.

Although the initial submissions for some ShadyPanda extensions occurred as early as 2018, the first indications of malicious activity were not observed until 2023, primarily involving a group of extensions disguised as wallpaper and productivity tools. According to researchers at Koi, these early versions were primarily focused on affiliate fraud; they achieved this by injecting tracking codes from major platforms such as eBay, Amazon, and Booking.com into legitimate user links to siphon revenue from purchases made by the user base. This marks the initial malicious monetization step of the campaign, using the installed user base for passive financial gain.

The operation escalated significantly in early 2024 with the introduction of search hijacking, a clear sign that the ShadyPanda operators were becoming more aggressive in their activities. For instance, an extension named Infinity V+ was observed redirecting users’ search queries to the trovi[.]com domain. In addition to this hijacking, the same component was found to be exfiltrating users’ valuable cookie data to dergoodting[.]com and sending their search queries to various gotocdn subdomains, indicating a move toward direct data theft and more pervasive user manipulation.

The most severe phase occurred later in 2024, when five extensions, including three that had been running innocuously since their 2018 and 2019 uploads and had built up a legitimate reputation, were modified through a malicious update to include a full “backdoor.” This powerful payload grants the operators the capability to perform remote code execution on the user’s browser. Koi Security detailed the backdoor’s function: “Every infected browser runs a remote code execution framework. Every hour, it checks api.extensionplay[.]com for new instructions, downloads arbitrary JavaScript, and executes it with full browser API access,” confirming its role not as fixed-function malware, but as a flexible command-and-control framework.

This backdoor functionality is used to continuously exfiltrate sensitive data, including browsing URLs, unique fingerprinting information, and persistent identifiers, all sent securely using AES encryption to the api[.]cleanmasters[.]store endpoint. A highly successful example from this set was the Clean Master extension on the Google Chrome Store, which had accumulated 200,000 installations before it was detected and flagged as malicious. In total, the group of extensions deployed with this particularly dangerous payload had already reached a combined install count of 300,000 at the time of discovery.

Reference:

  • Shadypanda Extensions Reach 4 Million Installs In Ongoing Malicious Drive Update
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityDecember 2025
ADVERTISEMENT

Related Posts

WinRAR Flaw Under Active Attack Now

Urgent Patches Issued For Major Flaws

December 10, 2025
WinRAR Flaw Under Active Attack Now

Microsoft Fixes Dozens Of Security Flaws

December 10, 2025
WinRAR Flaw Under Active Attack Now

WinRAR Flaw Under Active Attack Now

December 10, 2025
Android Malware Adds Stronger Data Theft

Sneeit RCE And ICTBroadcast Bug Power Attacks

December 8, 2025

MuddyWater Uses UDPGangster In Campaign

December 8, 2025
Android Malware Adds Stronger Data Theft

Android Malware Adds Stronger Data Theft

December 8, 2025

Latest Alerts

Urgent Patches Issued For Major Flaws

Microsoft Fixes Dozens Of Security Flaws

WinRAR Flaw Under Active Attack Now

Sneeit RCE And ICTBroadcast Bug Power Attacks

MuddyWater Uses UDPGangster In Campaign

Android Malware Adds Stronger Data Theft

Subscribe to our newsletter

    Latest Incidents

    Inotiv Reports Ransomware Data Breach

    Cyberattack Hits Leavenworth Services

    Cyber Outage Hits PES Energize Phones

    Honduran Vote System Faces Security Breach

    Petco Confirms Data Exposure Incident

    Hackers Hit Major Russian Logistics Firm

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial