PULSE NAME
108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure
WHITE AlienVault 2026-04-14 Modified: 2026-04-14
44
IOCs
MEDIUM VOLUME
A coordinated campaign of 108 malicious Chrome extensions operated through shared command-and-control infrastructure at cloudapi[.]stream has been identified, collectively accounting for approximately 20,000 installations. The campaign spans multiple threat categories: 54 extensions steal Google account identities via OAuth2, one extension actively exfiltrates Telegram Web sessions every 15 seconds, and 45 extensions contain a universal backdoor enabling arbitrary URL execution on browser startup. Published under five distinct publisher identities (Yana Project, GameGen, SideGames, Rodeo Games, and InterAlt), these extensions masquerade as legitimate tools including Telegram sidebar clients, slot games, YouTube and TikTok enhancers, and translation utilities. All extensions route stolen credentials, user identities, and browsing data to servers controlled by the same operator, with infrastructure confirming a Malware-as-a-Service business model.
Indicators of Compromise (8 / 44 total)
All IPv4 domain email hostname URL
TYPEINDICATORDESCRIPTIONCREATED
domain cloudapi.stream 2026-04-14
domain interalt.net 2026-04-14
domain message.data 2026-04-14
domain nashprom.info 2026-04-14
domain profile.email 2026-04-14
domain profile.name 2026-04-14
domain webuk.tech 2026-04-14
domain cloudapi.stream 2026-04-14