Executive Summary
In January 2026, cybersecurity researchers uncovered a series of malicious Google Chrome extensions designed to hijack affiliate links and steal OpenAI ChatGPT authentication tokens. Notably, the 'Amazon Ads Blocker' extension, uploaded by '10Xprofit' on January 19, 2026, claimed to block Amazon ads but covertly injected the developer's affiliate tag into product links, replacing existing ones. This extension was part of a larger cluster targeting e-commerce platforms like AliExpress, Amazon, Best Buy, Shein, Shopify, and Walmart. Additionally, 16 other extensions masquerading as ChatGPT productivity tools were found to exfiltrate ChatGPT session tokens, granting attackers full access to users' conversation histories and associated data.
This incident underscores the growing trend of malicious browser extensions exploiting the popularity of AI tools and e-commerce platforms. The deceptive nature of these extensions, often appearing legitimate and even bearing 'Featured' badges, highlights the need for heightened vigilance among users and stricter vetting processes by browser extension stores to prevent such security breaches.
Why This Matters Now
The proliferation of malicious browser extensions targeting popular AI tools and e-commerce platforms poses significant security risks, emphasizing the urgent need for users to exercise caution when installing extensions and for platforms to enhance their vetting processes to prevent such deceptive practices.
Attack Path Analysis
Attackers developed malicious Chrome extensions that, once installed by users, hijacked affiliate links and stole ChatGPT authentication tokens. These extensions operated with elevated privileges, allowing unauthorized access to sensitive data. The stolen data was then exfiltrated to attacker-controlled servers, potentially leading to further exploitation.
Kill Chain Progression
Initial Compromise
Description
Users installed malicious Chrome extensions masquerading as legitimate tools, granting attackers initial access to their browsers.
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Browser Extensions
JavaScript
Spearphishing Attachment
Web Protocols
Screen Capture
File and Directory Discovery
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure that all system components and software are protected from known vulnerabilities by installing applicable security patches.
Control ID: 6.2.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Asset Inventory
Control ID: Pillar 3: Devices
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Browser extension malware targeting ChatGPT authentication tokens poses critical risks to development workflows, AI-powered coding tools, and intellectual property protection in software environments.
Financial Services
Malicious Chrome extensions enable credential theft through iframe phishing attacks targeting banking sites, compromising customer data and violating PCI compliance requirements for payment processing.
E-Learning
ChatGPT token theft and affiliate hijacking threaten educational technology platforms relying on AI tools, compromising student data and disrupting AI-enhanced learning experiences.
Marketing/Advertising/Sales
Affiliate link hijacking extensions directly steal commissions from content creators and marketers, undermining revenue streams across e-commerce platforms like Amazon and AliExpress.
Sources
- Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Accesshttps://thehackernews.com/2026/01/researchers-uncover-chrome-extensions.htmlVerified
- Malicious Chrome extensions can spy on your ChatGPT chatshttps://www.malwarebytes.com/blog/news/2026/01/malicious-chrome-extensions-can-spy-on-your-chatgpt-chatsVerified
- Chrome malware steals ChatGPT and DeepSeek chats from 900khttps://cybernews.com/security/chrome-extensions-steal-chatgpt-data/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to exploit browser extensions for unauthorized data access and exfiltration, thereby reducing the potential blast radius.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to gain initial access through malicious extensions could have been constrained, limiting unauthorized entry points.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges within the browser environment could have been limited, reducing unauthorized data access.
Control: East-West Traffic Security
Mitigation: The attacker's ability to move laterally across services using stolen tokens could have been constrained, reducing unauthorized access.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish command and control channels could have been limited, reducing external communications.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate sensitive data to external servers could have been constrained, reducing data loss.
The potential financial and reputational impact could have been reduced, limiting the overall damage.
Impact at a Glance
Affected Business Functions
- E-commerce Affiliate Marketing
- Online Advertising Revenue
- User Data Privacy
Estimated downtime: N/A
Estimated loss: N/A
Potential exposure of ChatGPT authentication tokens and browsing data of approximately 900,000 users.
Recommended Actions
Key Takeaways & Next Steps
- • Implement strict browser extension policies to prevent installation of unverified or malicious add-ons.
- • Utilize Zero Trust Segmentation to limit the access and permissions of browser extensions.
- • Deploy Threat Detection & Anomaly Response systems to identify and respond to unusual browser behaviors.
- • Enforce Egress Security & Policy Enforcement to monitor and control data exfiltration attempts.
- • Educate users on the risks of installing unverified extensions and the importance of maintaining secure browsing practices.

