PULSE NAME
108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure
WHITE AlienVault 2026-04-14 Modified: 2026-04-14
44
IOCs
MEDIUM VOLUME
A coordinated campaign of 108 malicious Chrome extensions operated through shared command-and-control infrastructure at cloudapi[.]stream has been identified, collectively accounting for approximately 20,000 installations. The campaign spans multiple threat categories: 54 extensions steal Google account identities via OAuth2, one extension actively exfiltrates Telegram Web sessions every 15 seconds, and 45 extensions contain a universal backdoor enabling arbitrary URL execution on browser startup. Published under five distinct publisher identities (Yana Project, GameGen, SideGames, Rodeo Games, and InterAlt), these extensions masquerade as legitimate tools including Telegram sidebar clients, slot games, YouTube and TikTok enhancers, and translation utilities. All extensions route stolen credentials, user identities, and browsing data to servers controlled by the same operator, with infrastructure confirming a Malware-as-a-Service business model.
Indicators of Compromise (1 / 44 total)
All IPv4 domain email hostname URL
TYPEINDICATORDESCRIPTIONCREATED
email support@top.rodeo 2026-04-14