Date: 14 April 2026.

The Hacker News report that "researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited."

The latest news follows several similar such announcements about rogue Chrome browser extensions.

Heads up: other browsers are not immune from the same threats.

Read more: More dodgy Google Chrome browser extensions

Similar such announcements

March 2026

Read more: Two more dodgy Google Chrome browser extensions 

February 2026.

Read more: Read more: Another Malicious Google Chrome extension is discovered

January 2026.

Read more: Malware found in more Google Chrome extensions

Read more: Malware found in 5 more Google Chrome extensions

December 2025.

Read more: Malware found in 17 Firefox Add-ons

Read more: Featured Chrome browser extension caught intercepting millions of users' AI chats

Read more: Trust Wallet Chrome extension bug

How should you respond?

Keep your use of browser extensions to the absolute minimum.

And look out for suspicious behaviour in your browser.

If an extension you installed a long time ago suddenly starts to behave differently (example, unexpected pop-ups, performance issues) then consider that it may have received a malicious update.

If you suspect foul play then uninstall the extension.

Better still, uninstall and reinstall the latest release of the browser application.

Finally, don't assume that a "Featured" badge in an online marketplace and millions of existing users means an extension may not at some future date be harmful.

Make Joomla! CMS Security your #1 Priority

We help and support managers responsible for Joomla! CMS websites in UK business and third sector organisations across Cheshire, Greater Manchester, Merseyside and North West England.

Read more: WYNCHCO Joomla! CMS Help & Support.

Date: 14 April 2026.

The Hacker News report that "researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited."

The latest news follows several similar such announcements about rogue Chrome browser extensions.

Heads up: other browsers are not immune from the same threats.

Read more: More dodgy Google Chrome browser extensions

Similar such announcements

March 2026

Read more: Two more dodgy Google Chrome browser extensions 

February 2026.

Read more: Read more: Another Malicious Google Chrome extension is discovered

January 2026.

Read more: Malware found in more Google Chrome extensions

Read more: Malware found in 5 more Google Chrome extensions

December 2025.

Read more: Malware found in 17 Firefox Add-ons

Read more: Featured Chrome browser extension caught intercepting millions of users' AI chats

Read more: Trust Wallet Chrome extension bug

How should you respond?

Keep your use of browser extensions to the absolute minimum.

And look out for suspicious behaviour in your browser.

If an extension you installed a long time ago suddenly starts to behave differently (example, unexpected pop-ups, performance issues) then consider that it may have received a malicious update.

If you suspect foul play then uninstall the extension.

Better still, uninstall and reinstall the latest release of the browser application.

Finally, don't assume that a "Featured" badge in an online marketplace and millions of existing users means an extension may not at some future date be harmful.

Make Joomla! CMS Security your #1 Priority

We help and support managers responsible for Joomla! CMS websites in UK business and third sector organisations across Cheshire, Greater Manchester, Merseyside and North West England.

Read more: WYNCHCO Joomla! CMS Help & Support.

By browsing our website you agree to its use of cookies. Cookie Policy.