Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsLeaky Chrome Extensions with 37M Installs Caught Divulging Your Browsing History
Leaky Chrome Extensions with 37M Installs Caught Divulging Your Browsing History
Cybersecurity

Leaky Chrome Extensions with 37M Installs Caught Divulging Your Browsing History

•February 16, 2026
0
CSO Online
CSO Online•Feb 16, 2026

Why It Matters

Leaked browsing data exposes internal corporate sites and session credentials, creating a vector for espionage and credential theft that threatens enterprise security.

Key Takeaways

  • •287 Chrome extensions leak browsing history
  • •37 million installs affected worldwide
  • •Extensions span VPNs, productivity, shopping tools
  • •Data exfiltrated via encrypted, encoded payloads
  • •Risks include corporate espionage and credential harvesting

Pulse Analysis

Chrome’s extensibility has long been a double‑edged sword for enterprises. While extensions boost productivity, they also inherit the browser’s privileged access to web traffic. Recent research uncovered a cohort of seemingly benign add‑ons that request sweeping host permissions, allowing them to monitor every URL a user visits. By automating Chrome instances in isolated Docker containers, the analyst could systematically trigger navigation events and capture the resulting network traffic, revealing a pattern of systematic history harvesting across hundreds of thousands of users.

The technical sophistication of the exfiltration further complicates defense. Many extensions encrypt payloads with AES‑256 wrapped in RSA‑OAEP, while others rely on simple obfuscation like base64 or ROT47. This layered encoding defeats conventional DPI and signature‑based tools, forcing security teams to adopt behavioral analytics and sandboxing to spot anomalous outbound flows. The linear growth of traffic volume relative to URL length proved a reliable indicator of data leakage, highlighting the need for nuanced telemetry that correlates request size with browsing activity.

From a business perspective, the ramifications extend beyond individual privacy. Exposed internal URLs can map an organization’s network topology, aiding competitors or nation‑state actors in reconnaissance. When extensions also harvest cookies, attackers gain footholds for session hijacking and credential stuffing. Enterprises should enforce strict extension whitelists, employ zero‑trust network monitoring, and regularly audit installed add‑ons for unnecessary permissions. Users, meanwhile, must scrutinize extension reviews and limit installations to reputable sources, mitigating the risk of inadvertent data exposure.

Leaky Chrome extensions with 37M installs caught divulging your browsing history

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...