Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsGhostPoster Browser Malware Hid for 5 Years With 840,000 Installs
GhostPoster Browser Malware Hid for 5 Years With 840,000 Installs
Cybersecurity

GhostPoster Browser Malware Hid for 5 Years With 840,000 Installs

•January 15, 2026
0
HackRead
HackRead•Jan 15, 2026

Companies Mentioned

Mozilla

Mozilla

Microsoft

Microsoft

MSFT

Why It Matters

The incident exposes a systemic weakness in extension vetting, showing how cyber‑criminals can maintain long‑term footholds and compromise millions of users. It underscores the urgent need for stronger supply‑chain defenses and proactive user hygiene.

Key Takeaways

  • •Five‑year campaign across Chrome, Edge, Firefox
  • •Over 840,000 installations before detection
  • •Payload concealed inside innocuous PNG image
  • •Seventeen related extensions share same backend infrastructure
  • •Removed from stores; existing installs persist on browsers

Pulse Analysis

Browser extensions have become a fertile ground for sophisticated malware, and the GhostPoster campaign illustrates why. By embedding malicious code within a seemingly harmless PNG file, the attackers sidestepped traditional static‑analysis tools and manual reviews that focus on executable scripts. This steganographic approach allowed the extension to appear benign, gaining user trust and store approval across multiple browsers. The technique reflects a broader trend where threat actors exploit the trust model of extension ecosystems to deliver payloads silently.

The scale of the operation is striking: more than 840,000 users installed at least one of the compromised add‑ons, and some remained on devices for up to five years before discovery. LayerX’s follow‑up investigation revealed 17 additional extensions using the same command‑and‑control infrastructure, highlighting a coordinated, long‑term strategy rather than a quick‑hit ransomware scheme. Marketplace removals stop new downloads, but they do not automatically purge existing copies, leaving a lingering attack surface that security teams must manually address. This lag exposes a critical gap in current extension governance and underscores the difficulty of retroactively cleaning compromised ecosystems.

For enterprises and individual users alike, the lesson is clear: extension hygiene must become a continuous practice. Organizations should implement tools that inventory installed extensions, enforce least‑privilege permissions, and automatically flag anomalies such as hidden binaries or unexpected network traffic. Browser vendors need to enhance automated scanning, incorporate behavioral analysis, and provide streamlined removal mechanisms for already‑installed threats. As attackers refine evasion tactics, a proactive, layered defense—combining vendor vigilance, corporate policy, and user awareness—will be essential to safeguard the browser as a core productivity platform.

GhostPoster Browser Malware Hid for 5 Years With 840,000 Installs

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...