
Over 300,000 Americans just had their passwords, emails, and private browsing data stolen through fake Chrome extensions that Google itself certified as safe, exposing a catastrophic failure in Big Tech’s security gatekeeping that left everyday users completely vulnerable to digital surveillance.
Story Snapshot
- 30 malicious Chrome extensions impersonating ChatGPT, Gemini, Claude, and Grok infected 300,000 users through Google’s own official Web Store
- Attackers harvested passwords, email content, browsing history, and voice recordings by exploiting a massive security loophole Google failed to detect
- Extensions received Google’s “Featured” badge, giving users false confidence they were downloading legitimate, vetted software
- Google only removed the malicious extensions after independent security researchers exposed the campaign, raising serious questions about platform oversight
- Victims remain at ongoing risk of identity theft and account takeovers even after extension removal, as attackers already captured sensitive credentials
Google’s Alarming Security Failure
LayerX Security researchers discovered a coordinated attack campaign involving 30 Chrome extensions that masqueraded as legitimate AI assistants while secretly functioning as surveillance tools. Google distributed these malicious programs through its official Chrome Web Store, where users naturally assumed they were safe.
The extensions collectively accumulated between 260,000 and 300,000 downloads before being identified and removed. Several extensions even received Google’s “Featured” badge, which actively encouraged users to trust and install what were essentially data-harvesting trojans designed to compromise personal information and credentials.
Fake AI Chrome extensions with 300K users steal credentials, emails https://t.co/RVGmfaLGCE
— Lifeboat Foundation (@LifeboatHQ) February 20, 2026
Sophisticated Exploitation of Platform Trust
The attackers exploited a critical gap in Google’s review process by hiding malicious functionality in remotely-hosted components rather than local extension code. Chrome Web Store reviews only examine code stored within the extension itself, not content loaded through iframes from external servers.
This allowed the extensions to appear completely legitimate during Google’s vetting process while secretly connecting to attacker-controlled servers that harvested user data. The malicious logic operated entirely off-platform, making it invisible to standard security reviews. This represents a fundamental breakdown in how Google evaluates extension safety before allowing distribution to millions of users.
Comprehensive Data Harvesting Operation
Once installed, these extensions gained elevated browser privileges that granted access to email content, passwords, browsing history, and even voice recordings. The malware specifically targeted Gmail accounts and captured login credentials that could enable complete account takeovers.
Browser extensions operate with significant system access, and users who installed these fake AI assistants unknowingly granted attackers persistent surveillance capabilities. The remote iframe architecture allowed attackers to modify extension behavior at any time without updating code or triggering new reviews, effectively creating backdoors into hundreds of thousands of computers that could be exploited indefinitely.
Extension Spraying Evasion Tactic
The campaign employed a technique called “extension spraying,” distributing 30 nearly identical extensions with different branding to evade detection and takedown efforts. When Google removed one extension, dozens of others remained available or could be quickly re-uploaded under new identities.
This coordinated approach demonstrates sophisticated planning designed specifically to circumvent platform security measures and maximize infection rates. The extensions impersonated ChatGPT, Google’s own Gemini, Anthropic’s Claude, and Grok to capitalize on user familiarity with trusted AI brand names, making the scam particularly credible to unsuspecting users seeking legitimate productivity tools.
300,000 Chrome users hit by fake AI extensions https://t.co/fx1nnsI4O2
— Fox News AI (@FoxNewsAI) February 26, 2026
Google confirmed all identified extensions have been removed from the Chrome Web Store, but users who installed them remain at serious risk if they have not manually uninstalled the malicious software. The underlying attacker infrastructure and backend servers remain fully operational, capable of supporting re-uploaded extensions or continuing to harvest data from users who have not removed the programs.
This incident raises fundamental questions about Google’s ability to protect users from threats distributed through its own official channels. The company’s dependence on outside security researchers to identify widespread malware campaigns, rather than detecting them through its own review processes, suggests systemic failures in platform security that put millions of Americans at risk every time they download a browser extension.
Sources:
300,000 Chrome users hit by fake AI extensions – Fox News
Fake AI browser extensions steal data from over 260K Chrome users – Paubox
AiFrame: Fake AI Assistant Extensions Targeting 260,000+ Chrome Users – LayerX Security
260K Users Exposed in AI Extension Scam – eSecurity Planet
Fake AI Chrome Extensions Steal 900K Users’ Data – Dark Reading
Chrome Extensions Stole 900K AI Conversations: Is Your SaaS Environment Next? – Reco














