Automatically translated.View original post

Chinese hackers embedded malware into victim browser

Chinese hacker DarkSpectre embeds malware into browser; over 9 million victims

The web browser, in addition to being an intermediary for computer users to enter the Internet world for a long time, is also one of the main targets of hackers' attacks, because if the web browser is accessible, it leads to easy access to the victim's classified information.

According to a report by the website Cyber Security News, a malware distribution campaign has been detected through the web browser extension, or Extension, by a group of hackers from China, DarkSpectre, whose target covers three popular web browsers: Chrome, Edge and Firefox. Currently, there are 8,800,000 victims of this campaign attack. The spread of malware is not just one, but three malware is used.

ShadyPanda, which affects Chrome, Edge, and Firefox web browsers, has 5,600,000 victims.

Zoom Stealer affects web browsers Chrome, Edge, and Firefox. 2,200,000 victims

GhostPoster affects web browser Firefox has 1,050,000 victims

The important thing is that the three malware attacks are not separate campaigns, but they are all included in the same campaign. All malware release plans are coordinated in step-by-step collaboration. A research team from Koi Security, a cybersecurity expert, revealed that the hackers have been poisoning Extensions that look like genuine Extensions that are harmless for people to download for more than five years and then drop the malware (payload) into the victim's machine. The research team has detected the link of the above malware between Performed infrastructure analysis of ShadyPanda malware.

In examining the infrastructure of such malware, the research team found that hackers had two domains in use, infinitynewtab [.] com and infinitytab [.] com, which are practical and harmless domains to deal with extensions like Weather Widgets and New Tab Pages, while these same domains have been in contact with the malware infrastructure like C2 or Command and Control at the same time. By managing the infrastructure wisely, realistically and seamlessly, it leads to the spread of the three malware. The research team also found that this infrastructure is linked to Extensions that spread up to 100 Extensions of malware.

The most interesting malware release technique, the research team, defined the technique as placing a "time bomb" on the Extension, where the bomb will be dormant for a long time before releasing the payload on the victim's machine. For example, the add-on called "New Tab - Customized Dashboard" will be dormant for three days after it is installed on the web browser before contacting the C2 server to download the payload. A review of the Marketplace download source found that the add-on is still a genuine add-on and a review from Users will not find anything wrong with the add-on. In addition, the add-on will start releasing malware only after the add-on has been fully monitored by the local security system. It can be called hidden and works very well. It also uses additional detection techniques with only 10% of the load of the website to make it harder to detect the Routine.

For its part, Payload is well hidden with PNG files that serve as the application's logo file. In the file, JavaScript scripts are hidden. Multilayers of scripts are included, such as custom Encoding, XOR encryption, and special code to handle the local security system. This will lead to the download of another 65 KB JavaScript from the C2 server to help hackers choose whether to Run anything on the victim's browser without making additional updates that could lead to it being monitored by a double security system.

# Trending # Lemon 8 Howtoo # Drug sign with lemon8 # lemon 8 diary # freedomhack

1/22 Edited to

... Read moreจากประสบการณ์และข้อมูลวิจัยล่าสุด การโจมตีผ่าน Extensions เว็บเบราว์เซอร์ถือเป็นภัยคุกคามที่มีความซับซ้อนและยากจะตรวจจับ เพราะมัลแวร์สามารถซ่อนตัวเป็นส่วนเสริมที่ดูเป็นของแท้และใช้งานทั่วไป เช่น "New Tab – Customized Dashboard" ที่แฝงมัลแวร์ไว้ในรูปแบบ Dormant หรือเฉยๆ เป็นเวลานานก่อนจะเริ่มทำงาน ทำให้ผู้ใช้ไม่สงสัยและยังคงใช้งาน Extensions ดังกล่าวโดยไม่รู้ตัว การฝังมัลแวร์ในรูปแบบนี้ส่งผลกระทบอย่างใหญ่หลวงเพราะเว็บเบราว์เซอร์คือช่องทางสำคัญที่เชื่อมต่อเข้าสู่ข้อมูลส่วนตัวและข้อมูลสำคัญ เช่น ข้อมูลการล็อกอิน บัญชีธนาคาร หรือแม้แต่การเข้าถึงข้อมูลประชุมออนไลน์ที่ถูกขโมยด้วยมัลแวร์ "Zoom Stealer" ในแคมเปญนี้ เทคนิคที่ใช้ ไม่เพียงแต่ใช้การซ่อนสคริปต์ JavaScript หลายชั้นและการเข้ารหัสแบบพิเศษ (Custom Encoding และ XOR) แต่ยังมีการทำงานร่วมกับโดเมนจริง ๆ อย่าง infinitynewtab.com เพื่อควบคุมและหลบเลี่ยงระบบรักษาความปลอดภัยต่าง ๆ ทำให้ผู้ใช้และโปรแกรมป้องกันไวรัสจัดการตรวจจับได้ยากมาก สำหรับผู้ใช้งานเบราว์เซอร์ แนะนำให้ระมัดระวังการติดตั้ง Extensions โดยเลือกติดตั้งเฉพาะจากผู้พัฒนาและแหล่งที่เชื่อถือได้ และควรตรวจสอบรีวิวและจำนวนผู้ใช้อย่างละเอียด รวมทั้งอย่าละเลยการติดตั้งซอฟต์แวร์ป้องกันไวรัสหรือโปรแกรมรักษาความปลอดภัยที่ทันสมัย นอกจากนี้ควรอัปเดตเบราว์เซอร์และ Extensions อย่างสม่ำเสมอเพื่อลดช่องโหว่ที่อาจถูกโจมตี สุดท้าย การติดตามข่าวสารและการแจ้งเตือนจากผู้เชี่ยวชาญด้านความปลอดภัยไซเบอร์ เช่น Koi Security หรือ Cyber Security News จะช่วยให้เราอัพเดตและเตรียมพร้อมรับมือกับภัยคุกคามเหล่านี้ได้ดียิ่งขึ้น

Related posts

SIEGEX is all CHEATERS & HACKERS😭
Why is this game full of cheaters and hackers and bugs🤷‍♀️ #siege #rainbowsixsiege #gaming #streamer #foryou
Phasma

Phasma

29 likes

scammers and hackers beware
Hudson
cercofhell

cercofhell

28 likes

Do you like hackers?
#hacker #hackers #tricked #fyp
Lil Conscious

Lil Conscious

38 likes

A laptop with a cloudy sky wallpaper and a white cup with a red logo. Text overlay reads: 'Free Websites That Saved My GPA AND MY SANITY Sharing So You Don't Struggle Too'.
A laptop screen displays Yahoo search results for 'Quizlet'. An overlay describes Quizlet as a free flashcard tool for memorizing terms, definitions, and formulas, making studying feel like a game.
A laptop screen displays Yahoo search results for 'Unriddle.ai'. An overlay describes Unriddle.ai as a free tool that breaks down notes, articles, or assignments to aid understanding of long readings.
Websites You NEED to Pass Your College Courses
Y’all college is hard enough without trying to figure everything out on your own 😩 So here’s my list of websites that actually helped me pass my classes like, these were in my survival kit. I’m not gatekeeping 🫶🏽 Quizlet When I needed to memorize terms FAST. I used it for flashcards, and the matc
Beauty

Beauty

276 likes

The image shows a keyboard with a fingerprint icon, overlaid with "OUTSMART HACKERS" and "Secrets they don't want you to know," serving as the title for a guide on cybersecurity.
This image explains hackers use software to guess passwords and advises creating long passwords with a random mix of letters, numbers, and symbols to defend against such attacks.
The image warns that hackers try common passwords and advises users to defend themselves by avoiding easy words/phrases and not reusing passwords across different sites.
SECRETS Hackers DON’T Want You to Know!
After hackers got into my Facebook account and completely erased it, I dusted myself off and started a deep dive to understand why and how hackers work. The best way to protect yourself is to outsmart them. Here are 5 secrets Hackers DON'T want you to know! Share this with everyone! #lemon8pa
techgirljen

techgirljen

424 likes

A young woman with long dark hair, wearing a pink satin shirt, smiles at the camera while sitting at a table. Overlay text reads: 'Tools and sites I use as a cybersecurity student to progress my skills and keep me interested in studying'.
A screenshot of 'The Hacker News' website, displaying various cybersecurity news articles from January 2025, including topics like vulnerabilities, malware, cyber espionage, and AI jailbreak methods. An ad for Zscaler and a banner for CIS Hardened Images are also visible.
A screenshot of the O'Reilly learning platform, showing various books and expert playlists related to AI, engineering, and data. Overlay text highlights the subscription cost ($50/month or $499/year) and its value for accessing books and live events.
Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

103 likes

Look world I just made this Instagram account right now Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers just login me out of it showing favoritism and discriminate against Glen Nickolas Akins this is against my federal
glentrump359

glentrump359

0 likes

Look world I just made this Instagram account right now Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers just login me out of it showing favoritism and discriminate against Glen Nickolas Akins this is against my federal
glentrump359

glentrump359

0 likes

A hand holds a pink iPhone with text 'Tech 101 For Beginners' and 'Tips to help Non-Tech Savvy Users,' accompanied by laptop and phone app icons, against a brick background.
A pink iPhone in its box, illustrating the tip to 'Keep Your Devices Updated' with text explaining why updates help and advising to enable automatic updates.
An iPhone screen displaying app icons and display settings, accompanying the tip to 'Use Strong, Unique Passwords' with reasons why and advice on using combinations and password managers.
Tech Hacks For Beginners 📲💻😬
I have some great tips for non-tech savvy tech users. I know these tips will help you learn your tech more quickly and effectively. 1. Keep Your Devices Updated Why It Helps: Updates often contain security patches and improvements that help your device run smoothly. Tip: Enable automatic updat
Joy 📚

Joy 📚

282 likes

Most small businesses believe they’re too small to be hacked… but that’s not how cyber risk works. In today’s connected world, your business doesn’t stand alone. You rely on vendors, payroll systems, cloud platforms, CRMs, IT providers, to run your operations. But here’s the truth many people ov
Abby❤️💎

Abby❤️💎

0 likes

Don’t Use Airport USB Chargers!
TSA is now advising NOT to use Airport USB Chargers. Bring your own USB charging bricks. "Hackers can install malware at USB ports (we’ve been told that’s called 'juice/port jacking'). So, when you’re at an airport do not plug your phone directly into a USB port. Bring your TSA-compl
Destination & Travel Junkies

Destination & Travel Junkies

151 likes

A smartphone displays a message asking God to unblock it due to hackers. A patterned pad and colorful items are in the hazy background. The image includes Lemon8 branding and a username.
God, please unblock this android, hackers have in
Olga Ledbetter

Olga Ledbetter

37 likes

Hackers hijacked antivirus features to install mal
Hackers hijacked antivirus features to install malware - here's what we know https://www.yahoo.com/tech/cybersecurity/articles/hackers-hijacked-antivirus-features-install-140500891.html #hackers #malware #cybersecurity #antivirus
angela1957

angela1957

1 like

A message to Minecraft hackers…
You should join the server #minecraft #gaming #fyp
BendersMC

BendersMC

13 likes

BIG Holiday Costco Shop & Haul | Anchorage, Alaska
vanditsv

vanditsv

2 likes

Ban Hackers
😃 #fcmobile #eafcmobile #fifamobile #fcmobile25 #eafc
manuelofficial_13

manuelofficial_13

4 likes

WARZONE HACKERS
Warzone is full hackers and call of duty does not care #warzone #hacker #memesdaily #memes🤣 #gaming
DUSTINMYRQ ™

DUSTINMYRQ ™

3 likes

Hackers
How call of duty has me #call of duty #hacker #warzone
Stevie_Wonders

Stevie_Wonders

1 like

#yungblud
watch4hackers

watch4hackers

5 likes

PSA PSA PSA ‼️ #fyp #hackers #facebook #scammers #viral
Kay’s House ✨

Kay’s House ✨

1 like

How Hackers Could Crash 20 Million Devices! #podcast #hacker #hack #fyp
ShawRyanClips

ShawRyanClips

2 likes

I wanted a real project I could actually show, not just talk about. So I used Atoms ⚛️ Check it out here: https://tinyurl.com/3xzc8xbe It feels like having a whole AI team helping me: 🔍 they do the deep research first 🏁 then Race Mode builds different versions so I can compare 👥 I just pick
emilie.studygram

emilie.studygram

19 likes

Hackers Dream
🕶 Digital Survival Duo "What if the real threat wasn’t in the email… but hidden in the vacation photo you just opened?" Remote Access Terminal (R.A.T.) and Image Hunter are not theory — they’re step-by-step, copy-paste-ready manuals with real, verifiable code. Learn exactly how attackers
Dark Meta

Dark Meta

9 likes

Hackers suck
Fastcarracer36

Fastcarracer36

7 likes

Kalebdavis19

Kalebdavis19

0 likes

Bigfoot Super Hackers.
#manthoughts #hackers #laughoutloud #bigfootvlog #lifetips
Alien Hayes

Alien Hayes

11 likes

Hackers Be Like:
#fypage
AidenIsMyself

AidenIsMyself

0 likes

Poor Belle ! #beauty & the beast salt shackers
Like why did they have to paint her face like that 😂😂🤣🤣 #new #beauty #beautyandthebeast #disney #salt #pepper #homegoods #finds #fyp #fypシ #trending #shop #shopping #shopwithme #fypage #explore #explorepage #reels #eleydencreations #content #contentcreator #creator
EleydenCreation

EleydenCreation

651 likes

#stitch with @Steve-O’s Wild Ride! Podcast & @Drew On Spotify | what do you think? 🤔 I suggest checking out @The Hacking Games to support your kids! 💥 #videogames #onlinesafety #parentinghacks #momsoftiktokover30
Fareedah | Protect Kids Online

Fareedah | Protect Kids Online

5 likes

Look world Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers just locked and removed my lives for no reason cause I'm speaking my freedom of speech constitutional rights and laws FBI and state police DEA and governme
glentrump359

glentrump359

0 likes

Browser Syncjacking Awareness
Be vigilant on downloading Google extensions as some may give hackers unauthorized access to your device. #hacking #cybersecurity
Lemon8er

Lemon8er

0 likes

Chinese Hackers Breach U.S. Treasury
#cybersecurity #cyberattack #ustreasury #janetyellen
Her Tidings

Her Tidings

0 likes

A monitor displays the Martin AI assistant dashboard with sections for to-dos, reminders, calendar, and chat, set on a desk with a keyboard and plant, illustrating the phrase "Say what you need, it gets it done."
The Martin AI assistant dashboard is shown, featuring to-dos, reminders, calendar, inbox, and a chat interface for sending schedules, emphasizing its ability to use voice commands for tasks like texting and setting reminders.
The Martin AI assistant dashboard displays to-dos, reminders, calendar, and an inbox with emails, highlighting its function to remember and track information across various platforms without repetition.
Your to-do list just got a personal manager
You know when you have too many tabs open in your brain? This app is like closing all of them... at once. Martin is your Al assistant that actually works like a real one. Need to text someone, forward notes, set reminders, or manage your day? Just tell Martin. It connects with your inbox,
Reverelia

Reverelia

363 likes

A list titled 'Top Cybersecurity GitHub Projects' created by Dan Nanni, updated 2026/1. It displays 25 GitHub projects with their star counts, repository names, and brief descriptions, covering tools for hacking, pentesting, reverse engineering, proxies, and security scanning.
Top cybersecurity-related GitHub projects
My top GitHub list for cybersecurity projects is updated for this month 😎👆 Explore top-ranked FOSS projects spanning both the defensive and offensive sides of cybersecurity. Find a high-res pdf book with all my cybersecurity related infographics from https://study-notes.org #cybersecurity
Dan Nanni

Dan Nanni

27 likes

Wz hackers
Who misses Warzone tempo movement gameplay I feel like it was honestly peak. I don’t think the game will ever reach that level again. There are too worried about selling bundles rather than fixing the game #wargaming #streamer #fypシ゚viral #teamwipewarzone #hackers
Sauccyyyjgaming

Sauccyyyjgaming

0 likes

hackers everywhere
#fortinite #fyp
Outro-7

Outro-7

0 likes

If you have the Samsung, you need to watch this and update your phone immediately 
Cybersecurity Girl

Cybersecurity Girl

47 likes

A woman with dark hair and a light orange top smiles at the camera. The background features a wooden wall. Watermarks for Lemon8 and TikTok Lite with the username @angelawrivers are visible.
Hackers are using Google.com to deliver malware
Hackers are using Google.com to deliver malware by bypassing antivirus software and here is how to stay safe https://www.msn.com/en-us/news/technology/hackers-are-using-google-com-to-deliver-malware-by-bypassing-antivirus-software-here-s-how-to-stay-safe/ar-AA1GIDSi?ocid=sapphireappshare #hackers
angela1957

angela1957

0 likes

Educate yourself on why data privacy and ownership us important. Follow @Sia Foundation. Their site is very educational. They’re doing a couple of giveaways this month ✌️ #dataprivacy
Itzett

Itzett

1 like

Vibe coding is more accessible but it’s not as simple as speaking plain English😡
NO! Vibe coding is NOT as simple as people say! And if done poorly, you can get hacked 😒 45% of the apps built with AI could be vulnerable from day one. We’re talking about: 1. Hardcoded API keys 2. Missing authentication 3. Vulnerable dependencies These are common issues in AI generated c
Learn AI with Rosie

Learn AI with Rosie

0 likes

Look world on TikTok right now removing my freedom of speech constitutional and complaints these meth heads going crazy frfr on God Jesus Christ y'all need some serious help Look world Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone
glentrump359

glentrump359

0 likes

warzone hackers be mad little babies
#cod #ps5 #gamergirl #warzone #fuckhackers
Twilightvile

Twilightvile

2 likes

This table makes my space feel bigger than it is—because it works harder than any piece of furniture I own 🛋️🪄 #AnywaysWood #spacehackers #tinyhomeideas #cleverfurniture #hometricks
Amy

Amy

0 likes

Ban Hackers
Heel to Heel Flick #fcmobile #eafcmobile #fifamobile #fcmobile25 #eafc
manuelofficial_13

manuelofficial_13

0 likes

Look world Elon Musk and Donald Trump and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers still harassing me on all my social media apps showing favoritism and discriminate against Glen Nickolas Akins cause I'm listening to music
glentrump359

glentrump359

1 like

I urge you to go Google this. These Hackers starte
Hollywood

Hollywood

0 likes

Hackers, AI and Cyberattacks
https://www.techradar.com/ai-platforms-assistants/if-hackers-can-use-ai-to-automate-massive-cyber-attacks-terminator-robots-are-the-least-of-our-problems #ai #hackers #cyberattacks #robots
angela1957

angela1957

2 likes

It’s scary to think that sometimes the most evil people look totally normal, and they could even be your neighbors. Always background check. It’s better to be safe than sorry. @Public Data Check #checkurself #truecrime #truecrimecommunity #fyp #ad
Crime With Kourt

Crime With Kourt

42 likes

See more