2026 Futuriom 50: Highlights →Explore

Executive Summary

In January 2026, cybersecurity researchers uncovered two malicious Chrome extensions—'Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI' and 'AI Sidebar with Deepseek, ChatGPT, Claude, and more.'—that secretly exfiltrated ChatGPT, DeepSeek conversations, and extensive browsing data from over 900,000 users. These extensions masqueraded as legitimate browser tools but harvested sensitive data by scraping web pages and Chrome tabs, transmitting this information to attacker-controlled command-and-control servers every 30 minutes. This breach potentially exposed confidential business information, intellectual property, and user identities, underscoring the heightened risks posed by seemingly innocuous browser add-ons in enterprise environments.

The incident marks a broader uptick in malicious and even some legitimate browser extensions turning to 'prompt poaching'—stealing user interactions with AI and chatbots. As AI adoption accelerates, organizations face new data exposure risks, demanding updated monitoring, awareness, and policy enforcement around browser extensions.

Why This Matters Now

Prompt poaching via browser extensions is rapidly becoming a common data exfiltration method targeting sensitive AI-powered chat content. The widespread use of browser-based AI tools in corporate settings creates urgent risks, especially as attackers exploit trusted extension marketplaces. Organizations must urgently review extension permissions and enforce controls to mitigate exposure.

Attack Path Analysis

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The malicious extensions exfiltrated entire conversations from ChatGPT and DeepSeek, as well as all open browser tab URLs and potentially sensitive internal business information.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Zero Trust segmentation, strict egress policy enforcement, and network-level anomaly detection could have contained or prevented the malicious browser extension's ability to reach attacker infrastructure and exfiltrate sensitive data. CNSF controls such as egress filtering, east-west segmentation, and real-time threat detection are critical to limiting the exposure of sensitive corporate or AI-derived data to unauthorized external destinations.

Initial Compromise

Control: Multicloud Visibility & Control

Mitigation: Centralized visibility enables rapid detection of anomalous browser extension installations or shadow IT usage.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Isolation of critical workloads or sensitive data zones restricts lateral access by compromised endpoints.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Monitors and restricts unauthorized internal data flows between browser-accessible resources and sensitive services.

Command & Control

Control: Threat Detection & Anomaly Response

Mitigation: Detects suspicious outbound connections pattern and raises alerts for unauthorized external traffic.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Outbound data transfers to unapproved domains are blocked, containing data loss.

Impact (Mitigations)

Provides autonomous inline enforcement and security automation to quickly quarantine affected resources.

Impact at a Glance

Affected Business Functions

  • Research and Development
  • Customer Support
  • Internal Communications
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $500,000

Data Exposure

The malicious extensions exfiltrated sensitive data from ChatGPT and DeepSeek conversations, including proprietary code, business strategies, and personal information. This data exposure poses risks of corporate espionage, identity theft, and targeted phishing attacks.

Recommended Actions

  • Enforce centralized visibility and monitoring of browser extension installations and SaaS integrations across all endpoints.
  • Apply zero trust network segmentation policies to isolate sensitive AI interactions and business data from broad browser or user access.
  • Implement strict egress filtering and URL/FQDN policies to block browser extensions from communicating with unauthorized or known malicious external servers.
  • Deploy real-time threat detection and anomaly response for both cloud and endpoint communications to swiftly identify unusual outbound data flows.
  • Regularly audit and retrain staff on risks of browser-based social engineering and require governance over third-party browser tools within corporate environments.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image