Executive Summary
In early 2026, malicious browser extensions masquerading as AI assistant tools were discovered to have been installed by approximately 900,000 users across Chrome and Edge browsers. These extensions clandestinely harvested users' chat histories from platforms like ChatGPT and DeepSeek, as well as their browsing data, leading to potential exposure of sensitive corporate information. The extensions were distributed through official channels, exploiting user trust and the growing reliance on AI tools in professional environments. (microsoft.com)
This incident underscores the escalating threat posed by seemingly legitimate browser extensions, especially those integrating with AI platforms. As organizations increasingly adopt AI tools, the risk of data exfiltration through such extensions becomes more pronounced, necessitating heightened vigilance and robust security measures.
Why This Matters Now
The proliferation of AI tools in corporate settings has made them attractive targets for cybercriminals. This incident highlights the urgent need for organizations to scrutinize third-party extensions and implement stringent security protocols to safeguard sensitive data.
Attack Path Analysis
The attack began with the distribution of malicious AI-themed browser extensions through the Chrome Web Store, leading to their installation by users. Once installed, these extensions exploited browser permissions to collect sensitive data without further user interaction. The extensions maintained persistence by automatically reloading with the browser, ensuring continuous data collection. Collected data was periodically transmitted to attacker-controlled servers using HTTPS POST requests. This exfiltration exposed organizations to potential leakage of proprietary information. The impact included unauthorized access to sensitive data, posing significant privacy and compliance risks.
Kill Chain Progression
Initial Compromise
Description
Malicious AI-themed browser extensions were distributed through the Chrome Web Store, leading to their installation by users.
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Valid Accounts
Browser Extensions
Automated Collection
Exfiltration Over C2 Channel
User Execution: Malicious File
Phishing: Spearphishing Attachment
Subvert Trust Controls: Code Signing
Application Layer Protocol: Web Protocols
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure that security policies and operational procedures for managing system and software vulnerabilities are defined, documented, in use, and known to all affected parties.
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Asset Management
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Information Technology/IT
Infostealer extensions targeting AI chat platforms create massive data exfiltration risks for IT organizations handling proprietary code, workflows, and technical discussions across 20,000+ enterprise tenants.
Computer Software/Engineering
Malicious browser extensions harvesting LLM conversations expose software development organizations to intellectual property theft, source code leakage, and compromised engineering workflows through AI assistant interactions.
Financial Services
AI assistant extensions collecting chat histories pose severe compliance violations for financial institutions, risking exposure of sensitive client data, trading strategies, and regulatory-protected information through browser-based AI tools.
Health Care / Life Sciences
Healthcare organizations face HIPAA violations and patient data exposure through malicious extensions harvesting AI chat content, particularly impacting medical practitioners using AI tools for clinical documentation and research.
Sources
- Malicious AI Assistant Extensions Harvest LLM Chat Historieshttps://www.microsoft.com/en-us/security/blog/2026/03/05/malicious-ai-assistant-extensions-harvest-llm-chat-histories/Verified
- These Chrome AI assistants secretly harvested ChatGPT chatshttps://cybernews.com/security/chrome-ai-browser-extensions-steal-chat-data/Verified
- Chrome Extensions With 900,000 Downloads Caught Stealing AI Chatshttps://www.securityweek.com/chrome-extensions-with-900000-downloads-caught-stealing-ai-chats/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to exploit browser extensions for data exfiltration by enforcing strict segmentation and controlled egress policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The CNSF may have limited the reach of malicious extensions by enforcing strict segmentation, reducing the attacker's ability to exploit browser permissions.
Control: Zero Trust Segmentation
Mitigation: Zero Trust Segmentation would likely have restricted the extensions' access to sensitive data, limiting unauthorized data collection.
Control: East-West Traffic Security
Mitigation: East-West Traffic Security may have limited the extensions' ability to move laterally within the network, reducing the scope of data collection.
Control: Multicloud Visibility & Control
Mitigation: Multicloud Visibility & Control would likely have detected and limited unauthorized outbound communications, reducing data exfiltration opportunities.
Control: Egress Security & Policy Enforcement
Mitigation: Egress Security & Policy Enforcement may have restricted unauthorized data transfers, limiting the extent of data exfiltration.
The implementation of Aviatrix Zero Trust CNSF would likely have reduced the overall impact by limiting unauthorized data access and exfiltration, thereby mitigating privacy and compliance risks.
Impact at a Glance
Affected Business Functions
- Research and Development
- Product Management
- Legal and Compliance
- Executive Leadership
Estimated downtime: N/A
Estimated loss: N/A
Potential exposure of proprietary code, internal workflows, strategic discussions, and other confidential data shared during AI-assisted interactions.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict browser extension permissions and limit data access.
- • Enforce Egress Security & Policy Enforcement to monitor and control outbound traffic from browser extensions.
- • Utilize Threat Detection & Anomaly Response to identify and respond to unauthorized data collection activities.
- • Apply Multicloud Visibility & Control to gain insights into browser extension behaviors across cloud environments.
- • Educate users on the risks of installing unverified browser extensions and promote the use of trusted sources.



