Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Artificial Intelligence

Chrome, Edge Extensions Caught Stealing ChatGPT Sessions

Marketed as ChatGPT enhancement and productivity tools, the extensions allow the threat actor to access the victim’s ChatGPT data.

Malicious browser extensions

A threat actor has created 16 browser extensions to steal users’ ChatGPT sessions and published them to the official Chrome and Edge stores, LayerX reports.

Banking on the increased adoption of AI-powered browser extensions that fulfill users’ productivity needs, the threat actor published 15 extensions to the Chrome Web Store and one to the Microsoft Edge Add-ons marketplace.

Marketed as ChatGPT enhancement and productivity tools, the extensions have a combined download count of over 900, and they were still available through the official marketplaces as of January 26, LayerX says.

The tools were designed to intercept users’ ChatGPT session authentication tokens and send them to a remote server, but they don’t exploit ChatGPT vulnerabilities to do so.

Instead, they inject a content script into chatgpt.com and execute it in the MAIN JavaScript world.

The script monitors outbound requests initialized by the web application, to identify and extract authorization headers and send them to a second content script, which exfiltrates them to the remote server.

Advertisement. Scroll to continue reading.

“This approach allows the extension operator to authenticate to ChatGPT services using the victim’s active session and obtain all users’ history chats and connectors,” LayerX notes.

The cybersecurity company explains that the content scripts in the MAIN JavaScript enable the attacker to interact directly with the page’s native runtime, instead of relying on the browser’s content-script environment.

The analyzed extensions were also seen exfiltrating extension metadata, usage telemetry and event data, and access tokens issued by the backend and used by the extension service.

“This data allows the attacker to further expand access tokens and enables persistent user identification, behavioral profiling, and long-lived access to third-party services,” LayerX says.

Based on the use of a shared codebase, publisher characteristics, and similar icons, branding, and descriptions, the cybersecurity firm believes a single threat actor is behind all 16 extensions.

“By combining MAIN-world execution with authentication token interception, the operators obtained persistent access to user accounts while remaining within the boundaries of standard web behavior. Such techniques are particularly difficult to detect using traditional endpoint or network security tools,” LayerX notes.

Related: ‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing

Related: Anthropic MCP Server Flaws Lead to Code Execution, Data Exposure

Related: Chainlit Vulnerabilities May Leak Sensitive Information

Related: Weaponized Invite Enabled Calendar Data Theft via Google Gemini

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.