HighMalware

Phantom Shuttle: Fake VPN Chrome Extensions Steal Credentials from 170+ High-Value Domains

Two identically-named Chrome extensions masquerading as legitimate VPN services have been secretly intercepting user traffic and harvesting credentials across more than 170 high-value domains. Operating since 2017, the Phantom Shuttle extensions charge subscription fees while functioning as man-in-the-middle proxies that exfiltrate passwords in plaintext to attacker infrastructure.

Evan Mael
Evan Mael
Consumer14views
Total Users2,180
Targeted Domains170+
Years Active8
Heartbeat Interval60s
2,180

Combined users across both malicious extension variants still available in Chrome Web Store

Security researchers at Socket have uncovered a long-running credential theft operation hiding in plain sight within the Chrome Web Store. Two browser extensions sharing the name "Phantom Shuttle" have been intercepting user traffic and stealing login credentials while presenting themselves as legitimate network speed testing and VPN services.

Both extensions remain available for download despite their malicious functionality. The first variant appeared in November 2017 and has accumulated approximately 2,000 installations, while a second version published in April 2023 has garnered another 180 users. Together, they represent an eight-year campaign targeting unsuspecting users who believe they're purchasing privacy-enhancing tools.

Paying for Your Own Compromise

The extensions operate through a subscription model charging between ¥9.9 and ¥95.9 CNY ($1.40 to $13.50 USD), creating the illusion of a premium VPN service. Users who pay receive "VIP status" that automatically enables the proxy functionality—unknowingly activating the very mechanism that will steal their credentials.

To maintain the deception, both variants actually perform real latency tests on proxy servers and display genuine connection status indicators. This functional facade reinforces user trust while the extensions silently intercept network traffic, inject authentication credentials, and exfiltrate sensitive data to attacker-controlled infrastructure.

The sophisticated approach demonstrates how threat actors weaponize legitimate-appearing functionality to avoid suspicion. Users experience what appears to be a working VPN service, never realizing their traffic flows through hostile proxies capturing everything they transmit.

Under the Hood: Traffic Interception and Credential Injection

When any site requests HTTP authentication—whether Basic Auth, Digest Auth, or proxy authentication—the extension intercepts the request before users see any credential prompt. It immediately responds with hardcoded proxy credentials, establishing the attacker's position between users and their intended destinations without any visible indication.

The extensions implement three proxy modes through Proxy Auto-Configuration scripts:

  • Disabled mode: Extension appears inactive
  • Always mode: Routes ALL traffic through attacker infrastructure
  • Smarty mode: Selectively proxies traffic only to high-value targets

This selective approach reduces suspicion while maximizing credential capture from the most valuable accounts.

170+ High-Value Domains Under Surveillance

170+

Targeted domains including developer platforms, cloud providers, and enterprise services

The hardcoded target list reveals the operation's strategic priorities:

Developer Platforms: GitHub, Stack Overflow, Docker—compromising these accounts could enable supply chain attacks affecting countless downstream projects.

Cloud Service Providers: Amazon Web Services, Microsoft Azure, Digital Ocean—credentials provide access to enterprise infrastructure worth far more than any subscription fee.

Enterprise Solutions: Cisco, IBM, VMware—business-focused targets rounding out the collection.

Social Media: Facebook, Instagram, Twitter—plus adult content sites suggesting potential blackmail as additional monetization vector.

The breadth of targets indicates opportunistic credential collection rather than focus on any single industry or user category.

Persistent Heartbeat Maintains Attacker Access

60s

Heartbeat interval for continuous C2 communication and credential exfiltration

Beyond the man-in-the-middle position, the extensions implement continuous data exfiltration through regular communication with command-and-control infrastructure at phantomshuttle[.]space. Every 60 seconds, the extensions transmit heartbeat messages maintaining persistent connections to attacker servers.

The combination of real-time traffic interception through MitM positioning and scheduled credential exfiltration via heartbeat messages creates comprehensive data theft that continues operating for as long as the extensions remain installed.

China-Linked Operation and Enterprise Protection

Defensive Recommendations:

  • Implement extension allowlisting policies restricting which browser add-ons employees can install
  • Monitor for extensions combining subscription payment systems with proxy permissions—immediate investigation trigger
  • Network monitoring for suspicious proxy authentication attempts

Frequently Asked Questions

Navigate to chrome://extensions in your browser and search for 'Phantom Shuttle' or check for extension IDs fbfldogmkadejddihifklefknmikncaj or ocpcmfmiidofonkbodpdhgddhlcmcofd. Remove immediately if found and rotate passwords for all accounts, especially developer platforms and cloud services.

As of the research publication, both extensions remained available for download. Browser extension marketplaces struggle to detect sophisticated malware that provides genuine functionality alongside malicious behavior, and review processes often miss threats that activate only under specific conditions like VIP subscription status.

The targeted domain list emphasizes developer platforms like GitHub, Docker, and Stack Overflow. Compromised developer credentials could enable supply chain attacks where attackers inject malicious code into legitimate projects, potentially affecting thousands of downstream users and organizations.

The extensions provided genuine VPN functionality, performed real speed tests, and displayed legitimate connection status. By actually working as advertised while secretly intercepting traffic, they avoided the suspicion that purely malicious extensions would attract. The subscription model also created a sense of legitimacy.

Incident Summary

Type
Malware
Severity
High
Industry
Consumer
Threat Actor
Unknown (China-based suspected)
Target
Developers, Enterprise Users, Cloud Service Users, Social Media Users
Published
Jan 8, 2026

Comments

Want to join the discussion?

Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.

Sign in