Back to the blog
May 23, 2025

Threat actors continue to create Chrome extensions impersonating Fortinet and VPN providers

Since February 2024, an unknown threat actor has seeded 100+ malicious Google Chrome extensions that masquerade as legitimate tools.

Since February 2024, an unknown threat actor has seeded 100+ malicious Google Chrome extensions that masquerade as legitimate tools ranging from Fortinet VPN clients and DeepSeek AI helpers to generic productivity apps. These extensions are promoted via branded lure websites (e.g., forti‑vpn[.]com, deepseek‑ai[.]link) and published on the Chrome Web Store.

Key Observations

  • Excessive Permissions: Each extension requests broad host access, declarativeNetRequest, cookie access, and script injection across all sites.
  • Dynamic Code Execution: Extensions fetch encrypted payloads, bypass CSP via onreset DOM trick, then execute arbitrary JavaScript in user sessions.
  • Data Theft & Proxying: Observed commands include dumping all cookies (chrome.cookies.getAll), hijacking sessions, injecting ads/redirects, and establishing WebSocket‑based reverse proxies.

Risks

  • Credential and cookie theft leading to account compromise across SaaS platforms.
  • Man‑in‑the‑browser traffic manipulation, phishing page injection, and session hijacking.
  • Lateral movement by abusing harvested enterprise cookies or tokens for VPN/SaaS portals.

Recommended Actions

  1. Block & Remove: Blacklist extension IDs and associated domains (IOCs list: https://github.com/DomainTools/SecuritySnacks). Audit fleet for installations and remove immediately.
  2. Extension Control: Enforce Chrome policies (ExtensionInstallBlocklist, ExtensionInstallAllowlist) permitting only vetted extensions from trusted publishers.
  3. Least‑Privilege Review: Re‑evaluate existing extensions’ permissions; revoke those requesting broad host access or declarativeNetRequest without justification.
  4. User Awareness: Train users to verify developer legitimacy, scrutinize permissions, and avoid installing extensions from promotional links.
  5. Browser Hardening: Enable Chrome Safe Browsing Enhanced Protection and regularly review installed extensions across managed devices.

Summary

This campaign continues to demonstrate significant persistence and adaptability. As soon as malicious extensions are identified and removed from the Chrome Web Store, new variants rapidly emerge under different names and publishers. The dynamic nature of this threat emphasizes why continuous monitoring and management of browser extensions is crucial. IT teams must implement robust extension policies, conduct regular audits of approved extensions, and maintain vigilant oversight of browser extension usage across their organizations.

Related posts

Report

Debunking the "stupid user" myth in security

Exploring the influence of employees’ perception
and emotions on security behaviors