PUBlished on
July 23, 2025
updated on
November 5, 2025

The Hunt for Malicious Browser Extensions: What Security Teams Need to Know

Sophie Zhu and Scott Young

The December 2024 Chrome Extension Breach

In the last week of 2024, Cyberhaven experienced a huge supply chain attack. After gaining initial access through phishing, cybercriminals published a malicious version of the Cyberhaven Chrome extension. This extension passed Chrome Web Store’s own security review, and contained code capable of exfiltrating cookies, session tokens, and other sensitive data from users. 

Cyberhaven wasn’t the only one—this attack was part of a broader campaign targeting at least 35 Chrome extensions. Overall, it affected 2.6 million users. At Obsidian, we learned about this attack from the news and from one of our customers. This customer had downloaded the malicious extension, but thanks to an alert from Obsidian, they were able to quickly take action and remove it. 

Why Employees Use Risky Browser Extensions 

Browsers have become the gateways to work. They’re the most used desktop applications, connecting us with all the SaaS apps that run our day-to-day. And just like with SaaS, employees often install and use browser extensions to make their work run faster (or just for fun). This includes ad blockers, security tools, productivity enhancers, and even shopping assistants. Employees will customize their browser with a whole suite of extensions. IT and security teams already lack visibility into the SaaS apps their users are deploying, and browser extensions are one level worse. 

Even without an attacker in the picture, employees can grant risky permissions to browser extensions, like in the example below. 

How Threat Actors Weaponize Browser Extensions

Attackers weaponize browser extensions in a few different ways. 

One common tactic is listing malicious extensions on reputable browser stores. This is what happened with Cyberhaven. Because users are downloading an extension from an established brand name like Google, they believe they’re safe. But attackers can sneak their extensions past security checks by mimicking well-known vendors or claiming that their extensions serve popular purposes. 

Threat actors will also purchase or take over previously legitimate browser extensions. Once in their ownership, they begin to push out malicious updates. In this situation, it doesn’t matter if your browser extensions were originally safe and authentic! Attackers can still get in. 

Detecting & Prioritizing Malicious Extensions with Obsidian

This might as well be our official mantra by now, but as with other security challenges, the first step is visibility, visibility, visibility. It’s important to get a thorough catalogue of all browser extensions sitting in your environment as you think about addressing this challenge. 

Traditional app discovery tools often sit in inboxes to detect when users sign up for new apps. However, browser extensions don’t generate email notifications or other external signals. They only leave traces within the browser itself. That’s why Obsidian operates at the browser level too. 

Use Obsidian Security to sort all discovered browser extensions by risk level, permissions, and number of users, among other filters, so you can easily prioritize which extensions to chase down first. Start with a free trial today.

Frequently Asked Questions (FAQs)

What happened in the December 2024 Chrome extension breach?

In December 2024, a major supply chain attack saw cybercriminals publish a malicious version of the Cyberhaven Chrome extension after gaining access via phishing. The tainted extension, which passed Chrome Web Store security checks, could exfiltrate cookies, session tokens, and sensitive user data. This campaign targeted at least 35 Chrome extensions, ultimately affecting around 2.6 million users.

How do malicious browser extensions bypass security reviews?

Malicious browser extensions often bypass security reviews by disguising themselves as legitimate or well-known tools and sneaking harmful code through updates or initial uploads. Attackers may mimic reputable vendors or take over previously safe extensions, updating them with malicious features that go undetected during store reviews or subsequent updates.

Why are employees at risk when using third-party browser extensions?

Employees are at risk because they frequently install extensions for productivity, security, or personal convenience, often granting risky permissions without scrutiny. IT and security teams usually lack visibility into which extensions users have installed, making it difficult to manage or mitigate potential threats posed by unauthorized or malicious add-ons in the workplace.

What tactics do attackers use to weaponize browser extensions?

Attackers use several methods, such as uploading malicious extensions to official browser stores, impersonating legitimate brands, or taking control of existing trusted extensions and pushing out harmful updates. These methods exploit users' trust in trusted platforms and previously safe tools, allowing attackers to distribute malware widely and gather sensitive information.

You May Also Like

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo