Site icon Cyber Pross

Malicious Chromium Extension Campaign Infects 722 Devices Across Multiple Countries

🌍 Global Cyber Threat: Attackers Exploit Browser Extensions for Espionage

Security researchers have uncovered a massive malware campaign abusing Chromium-based browser extensions to infiltrate corporate environments and exfiltrate sensitive credentials. Dubbed β€œOperation Phantom Enigma,” this sophisticated attack has affected at least 722 devices across Vietnam, Russia, Colombia, Brazil, Czechia, and Mexico β€” with potential links to an Eastern European threat actor.


🧩 How the Malware Works

The operation involves distributing trojanized Chromium browser extensions (Google Chrome, Microsoft Edge) that appear legitimate but contain hidden background scripts capable of stealing sensitive data.

πŸ” Key Technical Capabilities:


πŸ”— Distribution Methods

These malicious extensions are not available in the Chrome Web Store. Instead, attackers distribute them via:

🎯 Common Targets Include:


🌐 Geographic Spread

The malware campaign has shown a concentrated presence in multiple regions:


🧠 Attribution: Who’s Behind It?

Investigators believe the campaign may be orchestrated by a well-funded Eastern European threat actor, based on:


πŸ›‘ Why This Campaign Is Alarming

Even a single malicious extension can act as a complete surveillance tool, stealing everything from login sessions to clipboard data and keystrokes.


βœ… Security Recommendations

πŸ” For Individuals

🧰 For Enterprises


πŸ“š Similar Historical Attacks

This campaign resembles tactics used in:


πŸ—£οΈ Final Thoughts

β€œOperation Phantom Enigma” highlights how even non-executable files like extensions can become powerful malware vectors. As attackers become more stealthy, proactive browser security becomes a critical pillar in every personal and enterprise cyber hygiene strategy.

Trust no extension. Audit regularly. Enforce minimal permissions.


πŸ“Œ Source & External Link

Original Coverage: The Hacker News

Exit mobile version