GhostPoster Campaign Resurfaces with 17 Malicious Browser Extensions
#Security

GhostPoster Campaign Resurfaces with 17 Malicious Browser Extensions

Security Reporter
2 min read

Researchers uncover 17 new malicious browser extensions linked to the GhostPoster campaign that accumulated 840,000 installations across Chrome, Firefox, and Edge stores.

Featured image

Security researchers have identified 17 new browser extensions associated with the ongoing GhostPoster campaign, which collectively gathered over 840,000 installations across Chrome, Firefox, and Microsoft Edge stores. This discovery comes just weeks after Koi Security's initial December report about the campaign.

The extensions conceal malicious JavaScript code within their logo image files. When activated, this code establishes communication with attacker-controlled servers to retrieve a heavily obfuscated payload. The payload performs three primary malicious activities:

  1. Monitors browsing behavior to harvest sensitive data
  2. Hijacks e-commerce affiliate links to divert commissions
  3. Injects invisible iframes to generate fraudulent ad clicks

Below are the identified extensions with their installation counts:

Extension Name Installations
Google Translate in Right Click 522,398
Translate Selected Text with Google 159,645
Ads Block Ultimate 48,078
Floating Player – PiP Mode 40,824
Convert Everything 17,171
Youtube Download 11,458
One Key Translate 10,785
AdBlocker 10,155
Save Image to Pinterest on Right Click 6,517
Instagram Downloader 3,807
RSS Feed 2,781
Cool Cursor 2,254
Full Page Screenshot 2,000
Amazon Price History 1,197
Color Enhancer 712
Translate Selected Text with Right Click 283
Page Screenshot Clipper 86

Extensions upload timeline

According to browser security firm LayerX, the campaign originated on Microsoft Edge around 2020 before expanding to Firefox and Chrome. Their analysis reveals significant technical evolution in the latest variants, particularly in the 'Instagram Downloader' extension:

  • Malicious staging logic moved to background scripts
  • Bundled image files used as covert payload containers
  • Payload extraction triggered by scanning for delimiter (>>>>)
  • Base64-decoded JavaScript executed after storage

"This demonstrates clear evolution toward longer dormancy and modularity," LayerX researchers noted. "The techniques increase resilience against both static and behavioral detection systems."

All identified extensions have been removed from official stores. However, users who previously installed them remain at risk. Security professionals recommend:

  1. Immediately remove any listed extensions using browser management tools (Chrome, Firefox, Edge)
  2. Conduct system scans using updated security software
  3. Monitor financial accounts for suspicious activity
  4. Reset credentials saved in browsers during the extension's active period

This incident highlights the persistent threat of malicious browser extensions, particularly those leveraging legitimate functionalities like translation tools and ad blockers to gain trust. Organizations should maintain strict extension approval policies, and users should regularly audit installed browser add-ons.

Comments

Loading comments...