ANAVEM
Reference
Languagefr
Computer screen displaying Chrome browser with malicious extension warning indicators

Chrome Extensions Turn Malicious After Ownership Transfer

Two Google Chrome extensions became malicious following ownership transfers, enabling attackers to inject code and steal user data.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
9 Mar 2026, 11:28 2 min read 4

Last updated 16 Mar 2026, 01:35

SEVERITYHigh
EXPLOITActive Exploit
PATCH STATUSUnavailable
VENDORGoogle Chrome
AFFECTEDQuickLens extension and one ad...
CATEGORYMalware

Key Takeaways

Chrome Extensions Compromised Through Developer Account Takeover

Two Google Chrome extensions became malicious on March 9, 2026, after their ownership was transferred from the original developer. The extensions, initially created by BuildMelon under the email akshayanuonline@gmail.com, were compromised to deliver malware and harvest user data. One of the affected extensions is QuickLens - Search Screen, while the second extension's full name wasn't disclosed in security reports.

The attack represents a supply chain compromise where legitimate browser extensions are weaponized after bad actors gain control of developer accounts. This method allows attackers to push malicious updates to users who already trust and have installed the extensions.

Chrome Users With Installed Extensions at Risk

Users who previously installed QuickLens and the second compromised extension are directly affected by this attack. The malicious code can inject arbitrary scripts into web pages, potentially compromising any website the user visits while the extension remains active.

The attack scope includes data harvesting capabilities that could expose browsing history, form inputs, login credentials, and other sensitive information processed through the browser. Chrome's extension permission model means these extensions likely had broad access to user web activity.

Malware Injection and Data Theft Capabilities Confirmed

The compromised extensions gained the ability to inject arbitrary code into web pages and distribute additional malware payloads to infected systems. Security researchers identified data harvesting functions that could steal sensitive user information during normal browsing sessions.

Chrome users should immediately remove QuickLens and check their installed extensions for any suspicious activity. Google's Chrome Web Store security team typically removes malicious extensions once identified, but users who installed them before detection remain vulnerable until manual removal.

Frequently Asked Questions

How do I remove malicious Chrome extensions?+
Open Chrome, go to chrome://extensions/, find the suspicious extension, and click Remove. Check for QuickLens and any extensions from BuildMelon developer. Restart your browser after removal.
What data can malicious Chrome extensions steal?+
Compromised extensions can harvest browsing history, form inputs, login credentials, and inject code into any website you visit. They operate with broad permissions that allow access to most web activity.
How did these Chrome extensions become malicious?+
The extensions became malicious after their ownership was transferred from the original BuildMelon developer to attackers. This supply chain attack method weaponizes trusted extensions that users already have installed.
Emanuel DE ALMEIDA
About the Author

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...