PULSE NAME
108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure
WHITE AlienVault 2026-04-14 Modified: 2026-04-14
44
IOCs
MEDIUM VOLUME
A coordinated campaign of 108 malicious Chrome extensions operated through shared command-and-control infrastructure at cloudapi[.]stream has been identified, collectively accounting for approximately 20,000 installations. The campaign spans multiple threat categories: 54 extensions steal Google account identities via OAuth2, one extension actively exfiltrates Telegram Web sessions every 15 seconds, and 45 extensions contain a universal backdoor enabling arbitrary URL execution on browser startup. Published under five distinct publisher identities (Yana Project, GameGen, SideGames, Rodeo Games, and InterAlt), these extensions masquerade as legitimate tools including Telegram sidebar clients, slot games, YouTube and TikTok enhancers, and translation utilities. All extensions route stolen credentials, user identities, and browsing data to servers controlled by the same operator, with infrastructure confirming a Malware-as-a-Service business model.
Indicators of Compromise (18 / 44 total)
All IPv4 domain email hostname URL
TYPEINDICATORDESCRIPTIONCREATED
hostname api.cloudapi.stream 2026-04-14
hostname cdn.cloudapi.stream 2026-04-14
hostname chat.cloudapi.stream 2026-04-14
hostname chrome.runtime.id 2026-04-14
hostname coin-miner.cloudapi.stream 2026-04-14
hostname crm.cloudapi.stream 2026-04-14
hostname gamewss.cloudapi.stream 2026-04-14
hostname goldminer.cloudapi.stream 2026-04-14
hostname herculessportslegend.cloudapi.stream 2026-04-14
hostname metal.cloudapi.stream 2026-04-14
hostname mines.cloudapi.stream 2026-04-14
hostname multiaccount.cloudapi.stream 2026-04-14
hostname tg.cloudapi.stream 2026-04-14
hostname topup.cloudapi.stream 2026-04-14
hostname wheel.cloudapi.stream 2026-04-14
hostname api.cloudapi.stream 2026-04-14
hostname mines.cloudapi.stream 2026-04-14
hostname tg.cloudapi.stream 2026-04-14