ANAVEM
Languagefr
Computer screen showing Chrome browser extensions with one highlighted in red

Chrome Extension Ran Malware for Year Despite Edge Ban

Google promoted a malicious Chrome extension that operated undetected for twelve months after Microsoft Edge had already blocked it.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
17 March 2026, 11:45 5 min read 0

Last updated 17 March 2026, 19:00

SEVERITYHigh
EXPLOITUnknown
PATCH STATUSUnavailable
VENDORGoogle
AFFECTEDChrome browser and Chrome Web ...
CATEGORYChrome & Web

Key Takeaways

Malicious Chrome Extension Evaded Google's Security for 12 Months

A Chrome extension containing hidden malware operated undetected in Google's Web Store for an entire year, continuing to expose millions of users even after Microsoft had already identified and banned the same extension from Edge. The malicious software managed to bypass Google's automated security systems and manual review processes throughout 2025, raising serious questions about the search giant's extension vetting procedures.

The extension masqueraded as a legitimate productivity tool while secretly executing malicious code in the background of users' browsers. Security researchers discovered the malware was designed to collect sensitive user data, including browsing habits, login credentials, and personal information from visited websites. The malicious code was carefully obfuscated to avoid detection by Google's security scanners, using advanced techniques to hide its true purpose from both automated systems and human reviewers.

What makes this incident particularly concerning is the timeline discrepancy between the two major browser platforms. Microsoft's Edge security team had identified and removed the extension from their store months before Google took similar action. This suggests that either Google's security protocols are less stringent than Microsoft's, or that information sharing between the two companies regarding malicious extensions is inadequate. The extension continued to accumulate downloads and positive reviews during this extended period, with many users unaware they were installing malware onto their systems.

The malware employed sophisticated evasion techniques, including delayed activation to avoid immediate detection and selective targeting of specific user demographics. It would remain dormant for several days after installation before beginning its malicious activities, making it difficult for users to connect any suspicious behavior to the newly installed extension. The code also included anti-analysis features designed to frustrate security researchers attempting to reverse-engineer its functionality.

Related: Google Photos 2026: How to Disable Ask Photos AI and Switch

Related: Google Pays $17M to Bug Hunters in 2025 VRP Program

Related: Android 17 Beta 2 Blocks Apps from Accessibility API Abuse

Related: Chrome switches to bi-monthly updates starting in September

Millions of Chrome Users Exposed to Data Theft Risk

The malicious extension affected millions of Chrome users worldwide who downloaded it during its year-long presence in the Web Store. The extension had accumulated over 2.5 million installations across various geographic regions, with particularly high adoption rates in North America and Europe. Users who installed the extension between early 2025 and March 2026 were potentially exposed to data harvesting, credential theft, and unauthorized access to their browsing sessions.

The impact extends beyond individual users to include corporate environments where employees may have installed the extension on company devices. Organizations using Chrome as their primary browser face potential data breaches, compromised internal systems, and regulatory compliance issues if sensitive business information was accessed by the malware. IT departments must now conduct thorough audits to identify which systems may have been compromised and assess the scope of potential data exposure.

Small businesses and educational institutions are particularly vulnerable, as they often lack the sophisticated security monitoring systems that larger enterprises deploy. Many of these organizations rely on basic antivirus solutions that may not have detected the extension's malicious behavior, especially given its sophisticated evasion techniques. The malware's ability to operate undetected for such an extended period means that affected users may have unknowingly provided access to months of sensitive browsing data and personal information.

Immediate Removal Steps and Security Recommendations

Users must immediately check their Chrome extensions list and remove any suspicious or recently installed extensions, particularly those claiming to offer productivity enhancements or browser optimization features. To access the extensions manager, users should navigate to chrome://extensions/ in their browser address bar and carefully review each installed extension for unfamiliar names or publishers. Any extension that cannot be clearly identified as legitimate should be removed immediately, and users should change passwords for any accounts accessed while the malicious extension was active.

IT administrators should deploy enterprise-wide extension audits using Chrome's administrative controls to identify and remove the malicious extension from all managed devices. Google Workspace administrators can use the Admin Console to review extension installations across their organization and implement policies to prevent similar incidents. Organizations should also review their browser security policies and consider implementing whitelist-based extension management, where only pre-approved extensions can be installed by users.

Security teams should monitor network traffic for unusual outbound connections that may indicate ongoing data exfiltration attempts. The malware was designed to communicate with command-and-control servers, so network monitoring tools may detect suspicious traffic patterns even after the extension has been removed. Organizations should also review authentication logs for any unusual login attempts or account access patterns that occurred during the extension's active period. TechCrunch has reported that security researchers are working to identify the full scope of the malware's capabilities and provide additional mitigation guidance.

Google has implemented additional security measures in response to this incident, including enhanced automated scanning for obfuscated code and improved manual review processes for extensions requesting sensitive permissions. The company has also begun sharing threat intelligence more actively with other browser vendors to prevent similar cross-platform security gaps. Reuters Technology coverage indicates that regulatory authorities are examining whether additional oversight of browser extension stores is necessary to protect consumers from similar threats in the future.

Frequently Asked Questions

How do I check if I have the malicious Chrome extension installed?+
Navigate to chrome://extensions/ in your browser address bar to view all installed extensions. Look for any unfamiliar extensions, especially those installed in 2025 or early 2026, and remove any you don't recognize or remember installing.
What data could the malicious Chrome extension have stolen?+
The malware was designed to collect browsing habits, login credentials, and personal information from visited websites. It could access any data you entered while browsing with the extension active, including passwords, form data, and sensitive personal information.
Why didn't Google detect the malicious extension sooner?+
The malware used sophisticated obfuscation techniques and delayed activation to avoid detection by Google's automated security systems. It remained dormant for days after installation and included anti-analysis features that made it difficult for security tools to identify its malicious behavior.
Emanuel DE ALMEIDA
About the Author

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...