Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsQuickLens Chrome Extension Steals Crypto, Shows ClickFix Attack
QuickLens Chrome Extension Steals Crypto, Shows ClickFix Attack
CybersecurityDefenseCrypto

QuickLens Chrome Extension Steals Crypto, Shows ClickFix Attack

•February 28, 2026
0
BleepingComputer
BleepingComputer•Feb 28, 2026

Why It Matters

The breach underscores how trusted browser extensions can become supply‑chain attack vectors, exposing both consumers and enterprises to credential theft and cryptocurrency loss, and it pressures platform owners to tighten vetting processes.

Key Takeaways

  • •QuickLens compromised, delivered malware via Chrome extension.
  • •Malicious update added ClickFix and crypto‑wallet stealing scripts.
  • •Extension stripped CSP headers, enabling arbitrary JavaScript execution.
  • •C2 server delivered payloads, including fake Google Update prompts.
  • •Google removed extension; users urged to uninstall and reset credentials.

Pulse Analysis

The QuickLens incident illustrates a growing trend: attackers are hijacking legitimate‑looking browser extensions to infiltrate user environments. By purchasing the extension on a marketplace and pushing a malicious update, the perpetrators leveraged the extension’s existing user base and even a Google‑featured badge to gain trust. This supply‑chain approach bypasses traditional endpoint defenses because the malicious code runs with the same permissions granted to a seemingly benign tool, highlighting the need for continuous monitoring of extension ecosystems.

Technically, the compromised version stripped critical security headers such as CSP, X‑Frame‑Options, and X‑XSS‑Protection, effectively disabling browser‑level mitigations. It then communicated with a C2 server, delivering a suite of payloads that included a fake Google Update dialog, a PowerShell‑based downloader, and a crypto‑wallet stealer capable of extracting seed phrases from MetaMask, Phantom, and other popular wallets. The use of a 1×1 GIF pixel onload trick to execute inline JavaScript on every page further amplified the attack surface, allowing credential harvesting, Gmail scraping, and even Facebook Business Manager data exfiltration.

Google’s rapid removal of QuickLens and the automatic disabling of the extension for affected users demonstrate a reactive but essential response. However, the episode serves as a cautionary tale for enterprises that rely on browser extensions for productivity. Organizations should implement strict extension whitelisting, employ real‑time behavioral analytics to detect anomalous network calls, and educate users about fake update prompts. As regulators increasingly scrutinize software supply chains, the pressure is on platform owners to enforce more rigorous vetting and transparency standards to protect the broader digital ecosystem.

QuickLens Chrome extension steals crypto, shows ClickFix attack

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...