
Over 300,000 Americans entrusted Google’s Chrome Web Store with their digital security, only to have their private emails, passwords, and personal data stolen by fake AI extensions that Google allowed to flourish—some even earning the platform’s coveted “Featured” badge.
Story Snapshot
- 30 malicious Chrome extensions masquerading as ChatGPT, Gemini, and other AI tools infiltrated 260,000-300,000 users, stealing emails, passwords, and API keys
- Google’s Chrome Web Store featured some of these malicious extensions, lending them false credibility while attackers used remote iframes to bypass security reviews
- LayerX Security exposed the “AiFrame” campaign using “extension spraying” tactics—deploying near-identical variants to evade detection and ensure persistence
- The breach underscores dangerous gaps in Big Tech oversight, leaving everyday Americans vulnerable to identity theft and fraud through supposedly vetted platforms
Google’s Featured Badge Gave Cover to Cybercriminals
LayerX Security researchers uncovered a coordinated attack campaign targeting Chrome users through 30 fraudulent extensions posing as legitimate AI assistants like ChatGPT, Gemini, Claude, and Grok. These malicious tools infiltrated between 260,000 and 300,000 installations through Google’s Chrome Web Store.
Attackers exploited the platform’s trusted reputation, with some extensions even receiving Google’s “Featured” designation—a seal of approval that misled users into believing these tools were safe. The extensions functioned normally enough to avoid suspicion, proxying real AI responses while silently exfiltrating sensitive user data including Gmail contents, login credentials, browsing histories, and valuable API keys.
Fake AI Chrome extensions with 300K users steal credentials, emails https://t.co/RVGmfaLGCE
— Lifeboat Foundation (@LifeboatHQ) February 20, 2026
Remote Iframes Exploited Chrome’s Security Blind Spot
The attackers employed sophisticated techniques that exposed critical weaknesses in Chrome’s extension review process. Rather than embedding malicious code directly in the extensions—which would trigger detection during Google’s security scans—they used remote iframes to load attacker-controlled interfaces from external servers.
This approach allowed cybercriminals to dynamically update their malware without resubmitting extensions for review, effectively transforming these tools into what LayerX researcher Dar Kahllon described as “general-purpose access brokers.”
The campaign utilized “extension spraying,” publishing near-identical extensions under varied branding to dilute takedown efforts. All 30 extensions shared identical backend infrastructure including JavaScript bundles, TLS certificates, and command-and-control servers, revealing a coordinated operation designed for maximum resilience and data harvesting efficiency.
Previous Precedents Show Pattern of Platform Failures
This breach follows troubling precedents that highlight systemic vulnerabilities in how Big Tech platforms police their ecosystems. The DarkSpectre attack previously infected 8.8 million American users through malicious browser extensions, demonstrating the scale of damage possible when gatekeepers fail their responsibilities.
A separate campaign targeting the AITOPIA sidebar extension compromised 900,000 AI conversations, exposing proprietary business communications and personal data. These incidents reveal a pattern: attackers consistently exploit the explosion in AI tool popularity since ChatGPT’s 2022 launch, knowing platforms prioritize growth over rigorous security vetting.
Chrome Web Store’s 300 million weekly users place implicit trust in Google’s oversight—a trust these criminals systematically abused while Google’s review systems proved inadequate against dynamic, server-controlled threats.
Real Americans Face Identity Theft and Financial Risks
The immediate consequences for affected users extend far beyond privacy violations. Stolen email credentials provide criminals access to financial accounts, tax documents, and personal communications, opening pathways to identity theft and fraud that can devastate families financially.
Compromised API keys grant attackers unauthorized access to paid services and enterprise systems, potentially exposing workplace networks and sensitive business data. Gmail users faced particularly acute risks since attackers specifically targeted email content, enabling theft of password reset links, banking notifications, and confidential correspondence.
Google confirmed removing all reported extensions after media coverage in late February 2026, but users who installed extensions like “AI Sidebar” (70,000 installations) and “Gemini AI Sidebar” (80,000 installations) must now manually delete them and change compromised passwords—a burden resulting from Google’s failure to prevent these threats upfront.
300,000 Chrome users hit by fake AI extensions https://t.co/fx1nnsI4O2
— Fox News AI (@FoxNewsAI) February 26, 2026
Platform Accountability Remains Elusive Despite Clear Failures
Google’s response—simply removing extensions after public exposure—fails to address the fundamental weaknesses that allowed this campaign to thrive. No arrests have been announced, and attackers remain anonymous and unpunished, likely already developing new variants.
The incident exposes how remote content loading breaks Chrome’s security model, yet Google has not announced comprehensive reforms to close this dangerous loophole. For everyday Americans aged 40 and older who rely on browser extensions for productivity, this breach represents yet another example of Big Tech prioritizing convenience and market dominance over user security.
The “Featured” badges Google granted to some malicious extensions particularly gall—the platform’s own stamp of approval became a tool for criminals, betraying users who reasonably expected Google to perform due diligence before endorsing products.
Sources:
300,000 Chrome users hit by fake AI extensions – Fox News
Fake AI browser extensions steal data from over 260K Chrome users – Paubox
300,000 Chrome users installed these malicious extensions posing as AI assistants – Tom’s Guide
260K Users Exposed in AI Extension Scam – eSecurity Planet
Fake AI Chrome Extensions Steal 900K Users’ Data – Dark Reading
Chrome Extensions Stole 900K AI Conversations: Is Your SaaS Environment Next? – Reco.ai














