Connect with us

Technology

Dangerous Chrome extensions mimic password managers

Published

on

Dangerous Chrome extensions mimic password managers

Chrome extensions are incredibly useful, whether you want to block ads, track the best deals or enhance your browsing experience. They can be downloaded from the Chrome Web Store, which functions like the Play Store but for extensions. However, extensions are easier to mimic and turn into malicious software compared to apps. 

As we just reported, over 3.2 million users were victimized by a security breach tied to 16 malicious browser extensions, highlighting how attackers exploit tools that seem legitimate to spread malware or steal sensitive data. 

Now, security researchers have discovered a polymorphic attack that allows malicious Chrome extensions to transform into other browser extensions, including password managers, crypto wallets and banking apps, to steal sensitive information.

Advertisement

Keep reading to learn how this attack works and how to protect yourself from it.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

Chrome browser on smartphone (Kurt “CyberGuy” Knutsson)

How the malicious polymorphic attack works

Security researchers at SquareX Labs have found a new attack that lets malicious Chrome extensions disguise themselves as legitimate ones, like password managers, crypto wallets and banking apps, to steal sensitive information. This “polymorphic” attack takes advantage of Chrome’s extension system to trick users while staying under the radar.

The attack starts with hackers uploading what looks like a harmless extension to the Chrome Web Store. It might even have real features, like an AI-powered marketing tool, to convince users to install and pin it to their browser.

Advertisement

Once installed, the malicious extension scans the victim’s browser for other extensions. It can do this in two ways. If it has permission to use the “chrome.management” API, it grabs a list of installed extensions directly. If not, it injects code into web pages to check for unique files or resources tied to certain extensions.

If it finds a targeted extension, like 1Password, the malicious extension reports back to an attacker-controlled server. The attacker then tells it to impersonate the real extension by disabling it if permissions allow, changing its name and icon and displaying a fake login popup that looks just like the real thing.

Fake extension page (SquareX)

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

Social engineering makes things worse

To steal user credentials, the malicious extension triggers a fake “Session Expired” prompt when the victim tries to log in to a website. This tricks them into thinking they need to reenter their credentials for their password manager or banking app. When they do, the stolen data is sent straight to the attackers.

Advertisement

After collecting the credentials, the extension switches back to its original form. It restores the legitimate extension, making everything look normal so the victim doesn’t suspect anything. This shows just how dangerous malicious Chrome extensions can be and why stronger security measures are needed to protect users.

We reached out to Google, and a spokesperson told CyberGuy, “We appreciate the work of the research community and we’ve received the report. We are constantly investing in ways to improve the security of the Chrome Web Store, and we take appropriate action when we learn of emerging threats.”

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Google Chrome extension on a laptop (Kurt “CyberGuy” Knutsson)

OUTSMART HACKERS WHO ARE OUT TO STEAL YOUR IDENTITY

Advertisement

5 ways you can protect your personal data

Here are five ways to safeguard your sensitive information and maintain your online privacy.

1. Keep your browser and extensions up to date: Outdated software is a goldmine for cybercriminals. Bugs or security gaps in old versions of your browser or extensions can be exploited to inject malicious code, steal data or take control of your system. Updates patch these vulnerabilities, making them a critical line of defense. Turn on automatic updates for your browser (e.g., Chrome, Firefox, Edge) so you’re always running the latest version without thinking about it. See my guide on keeping your devices and apps updated for more information.

2. Install extensions only from trusted sources: Official browser stores like the Chrome Web Store or Firefox Add-ons have rules and scans to catch bad actors, but they’re not perfect. Extensions from random websites or third-party downloads are far more likely to hide malware or spyware. Stick to the official store for your browser; don’t download extensions from sketchy links. 

3. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

4. Update your passwords: Change passwords for any accounts that may have been affected by the extension and use unique, strong passwords for each account. Consider using a password manager. This can help you generate and store strong, unique passwords for all your accounts. Get more details about my best expert-reviewed password managers of 2025 here.

5. Invest in personal data removal services: If your personal data gets stolen by the extension, it’s crucial to act quickly to reduce your risk of identity theft and scams. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Kurt’s key takeaway

The malicious extension highlights that Google isn’t doing enough to keep malware off its platform. Security researchers pointed out that the Chrome Web Store lacks protections against these types of attacks, such as blocking sudden changes to an extension’s icon or HTML, or at least alerting users when such changes occur. The problem isn’t limited to the Chrome Web Store. The Play Store also hosts malicious apps from time to time, affecting millions of users. Google needs to step up its security efforts and put user privacy front and center.

Advertisement

Do you trust Google to keep malicious apps and extensions off its platforms? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement

Technology

Will Trump’s DOJ actually take on Ticketmaster?

Published

on

Will Trump’s DOJ actually take on Ticketmaster?

In mid-February, the Department of Justice lost its head antitrust enforcer — just weeks before it was scheduled to argue one of the year’s biggest anti-monopoly cases in court.

Antitrust Division chief Gail Slater announced her departure suddenly, via a post on her personal X account. But to those who follow the agency closely, it was far from surprising. For months, leaks about the division described tensions between Slater and her team with DOJ leadership, and President Donald Trump’s penchant for personal dealmaking raised questions about who would really call the antitrust shots.

Over the summer, two of Slater’s top deputies were fired for what the DOJ said was “insubordination.” One of them later described pushing back against a wireless networking deal between Hewlett Packard Enterprise (HPE) and Juniper Networks, peddled by “MAGA-In-Name-Only” lobbyists and DOJ officials. The week before Slater announced her departure, a third deputy also left the agency.

The timing drew extra scrutiny because Mike Davis, one of the lobbyists close to Trump who worked on the HPE-Juniper deal, is also reportedly working for Live Nation. Live Nation did not provide a comment on the reported connection. “What was happening implicitly before is now explicit,” one former DOJ official, speaking on background to discuss personnel matters, says of Slater’s sudden departure. “A lot of very powerful corporations have figured out that they can just push through fantasy deals and fantasy outcomes in ways that were impossible before, and all they have to do is pay.” After Slater posted about her departure, Attorney General Pam Bondi thanked her in a statement “for her service to the Antitrust Division which works to protect consumers, promote affordability, and expand economic opportunity.”

”A lot of very powerful corporations have figured out that they can just push through fantasy deals”

Advertisement

The DOJ and a group of what’s grown to 40 state attorneys general sued Live Nation-Ticketmaster in May 2024, seeking to break up the company they allege used anticompetitive practices to lock artists and venues into its orbit. By allegedly tying together different parts of its business, using exclusionary contracts, and threatening “financial retaliation” to keep new players out of the market, the company succeeded in driving up ticket prices for consumers, they argue. Live Nation said in a blog post at the time that the lawsuit “ignores everything that is actually responsible for higher ticket prices.”

With jury selection in the case slated to begin on March 2nd, many are left wondering if the DOJ will remain on the case. Should the agency settle and choose to no longer be involved in the trial, at least some of the 40 states who joined the DOJ in the initial lawsuit could — and likely would — continue to push ahead with the litigation. “We look forward to going to trial on March 2 against Live Nation,” California’s top antitrust enforcer, Paula Blizzard, said at an event the day of Slater’s announcement. Tennessee Attorney General Jonathan Skrmetti also plans to move forward with the states’ lawsuit, Capitol Forum reported.

The DOJ very well may remain a lead plaintiff. Omeed Assefi, who is taking over Slater’s role in the interim, pledged to continue her agenda, MLex reported. As of February 17th, he has said the case is strong and favors trial, according to Capitol Forum. Global Competition Review also reported last week that Assefi encouraged staff to look to his work on criminal antitrust enforcement as a guide to how he’ll lead the division. “Ask them how I feel about settling cases in lieu of trial,” he reportedly said. “Ask them how I feel about accepting half measures and mere monetary penalties in lieu of seeking justice.”

But Slater, too, was known as a serious enforcer of antitrust law — and reports suggest her agenda was overruled.

“The states are no stranger to real politik

Advertisement

In general, states are always prepared for changes in their trial partners, says Gwendolyn Lindsay Cooley, former Wisconsin antitrust chief and chair of the National Association of Attorneys General Multistate Antitrust Task Force. (Cooley agreed to speak generally about the role of state enforcement and not about the Live Nation case in particular, which Wisconsin was part of during her time there.) “The states are no stranger to real politik,” Cooley says. State enforcers understand that priorities and personnel can change with administrations, either in state offices or at the DOJ. This can require changes, like reassigning the most seasoned lawyers to fill gaps left by federal attorneys. But Cooley says there are plenty of experienced litigators in the states. “My understanding from talking with states generally is that this is something they were prepared for, and so should be able to take this in stride,” Cooley says.

The T-Mobile-Sprint merger litigation may serve as a guide. After Trump’s DOJ approved the merger, some states settled their cases, but others continued a fight to block the merger. In the end, however, they failed — a court let the merger close anyway.

States could be more aggressive in pursuing the Live Nation-Ticketmaster trial. The company has been widely criticized by musicians and concertgoers alike, including after infamously bungling a Taylor Swift ticket presale in 2022. In an interview with Bloomberg, attorneys general for California and Connecticut said they’d maintain a high bar for settling. “Any resolution that is politically motivated or impacted, or any settlement that comes from trying to placate the president or meet his demands is not likely to fly with Connecticut or California either,” Connecticut AG William Tong said.

In fact, citizen complaints about Ticketmaster are among the top 10 things state AGs commonly hear about, according to Cooley. “That’s something that the state AGs are going to be really paying attention to.”

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.
Advertisement

Advertisement
Continue Reading

Technology

Spyware can hijack your phone in seconds

Published

on

Spyware can hijack your phone in seconds

NEWYou can now listen to Fox News articles!

You already know malware is out there. You hear about phishing emails, fake apps and data breaches almost every week. But every so often, something comes along that feels more personal. ZeroDayRAT spyware is one of those threats.

If your device gets infected, attackers can see almost everything happening on your phone. That includes your messages, notifications, location and even live camera feeds. Let that sink in for a second.

This is not some clunky virus from years ago. Security researchers at iVerify, a mobile security and digital forensics company, describe it as a complete mobile compromise toolkit. And it works on both iPhone and Android devices.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

ZeroDayRAT spyware can secretly access messages, camera feeds and banking apps on infected iPhone and Android devices. (Stefan Sauer/picture alliance via Getty Images)

What makes ZeroDayRAT spyware so dangerous?

Many types of malware focus on one goal. Some steal passwords. Others spy on text messages. ZeroDayRAT spyware goes much further.

Once installed, the infected device starts transmitting data back to a central dashboard controlled by the attacker. From there, they get:

  • A full stream of incoming notifications
  • A searchable inbox of text messages
  • Device model and operating system details
  • Battery level and lock status
  • Network activity and app usage

In other words, they can build a detailed profile of your daily life. Reports say the dashboard even shows a live activity timeline. That timeline reveals who you talk to most, which apps you use and when you are most active online. For anyone who values privacy, that is chilling.

It can watch and listen in real time

Here is where things get even more disturbing.

ZeroDayRAT spyware includes keylogging and live surveillance tools. That means attackers can:

Advertisement
  • Capture every keystroke with context
  • See which app you opened
  • Track how long you spent inside it
  • Record gestures and inputs
  • Access your microphone
  • Activate your front or rear camera
  • View your screen in real time

Imagine someone watching your screen as you log into your bank account. Or listening while you have a private conversation. This is not a hypothetical capability. According to reporting, those features are built directly into the platform.

Your banking and crypto apps are targets too

Many people assume mobile malware only steals passwords. ZeroDayRAT spyware goes after money directly. It reportedly includes tools designed to target digital payment and banking apps such as Apple Pay and PayPal. It can also intercept banking notifications and use clipboard injection to redirect cryptocurrency transfers to the attacker’s wallet.

Even without full remote control of your phone, that level of access is enough to drain accounts and steal digital assets. And here is another troubling detail. Reports indicate the platform is openly sold on Telegram, which lowers the barrier for would-be cybercriminals. You do not need advanced hacking skills to use it. That combination of power and accessibility makes this threat especially concerning.

Why Apple and Google are tightening app rules

There is a reason Apple strongly discourages installing apps outside the App Store. Google is also exploring changes to how sideloading works on Android. When apps bypass official stores, security screening becomes weaker. That opens the door for spyware like ZeroDayRAT to sneak in. While no system is perfect, sticking to trusted app marketplaces dramatically lowers your risk.

How to tell if ZeroDayRAT spyware is on your phone

Advanced spyware is designed to stay hidden. You may not see a flashing warning that something is wrong. Still, your phone often gives subtle clues when something is off. Watch for these warning signs.

Unusual battery drain

Spyware that streams data, records audio or tracks location runs constantly in the background. If your battery suddenly drains much faster than normal, especially after no major app changes, that can be a red flag.

Advertisement

Phone overheating without heavy use

If your device feels hot even when you are not gaming or streaming video, background surveillance activity could be consuming resources.

Strange data usage spikes

Check your mobile data usage in settings. A sudden jump may indicate that your phone is transmitting large amounts of information to an external server.

Unknown apps or configuration changes

Look for apps you do not remember installing. On iPhone, check for unknown configuration profiles under Settings. On Android, review installed apps and device administrator permissions.

Unexpected login alerts

If you receive password reset emails or login alerts you did not trigger, assume your credentials may be compromised.

Microphone or camera indicators are activating randomly

Both iPhone and Android show visual indicators when the camera or microphone is in use. If those indicators appear when you are not actively using them, investigate immediately.

Advertisement

If you suspect spyware, do not ignore it. Back up essential data, perform a factory reset and restore only trusted apps. In severe cases, consult a mobile security professional.

149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

Security researchers warn ZeroDayRAT functions as a full mobile surveillance toolkit sold openly online. (Photographer: Angel Garcia/Bloomberg via Getty Images)

How to remove ZeroDayRAT spyware from your phone

If you believe your phone may be infected, act quickly. Do not keep using it normally while you figure things out. Follow these steps.

1) Disconnect immediately

Turn off Wi-Fi and cellular data. This stops the spyware from sending more data to the attacker while you take action.

Advertisement

2) Change your passwords from a different device

Do not use the potentially infected phone to change passwords. Use a trusted computer or another secure device. Update passwords for email, banking, social media and payment apps first. Enable two-factor authentication (2FA) on every account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.  Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

3) Run a trusted mobile security scan

Install and run strong antivirus software on your phone. Let it scan your device for malicious apps, suspicious configuration profiles or hidden spyware components. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

4) Remove suspicious apps and profiles

On iPhone, check SettingsGeneralVPN & Device Management for unknown configuration profiles. Delete anything you do not recognize. On Android, review installed apps and remove anything unfamiliar. Also, check device administrator settings and revoke access from unknown apps.

5) Back up essential data carefully

If you plan to reset your phone, back up only photos, contacts and critical files. Avoid restoring full system backups that could reintroduce malicious software.

6) Perform a factory reset

A full factory reset on your iPhone or Android is often the most effective way to remove advanced spyware. This wipes the device and removes hidden malware components. After the reset, reinstall apps manually from the official app store instead of restoring everything automatically. Before performing a factory reset, back up important photos, contacts and files, as this process permanently deletes everything stored on the device.

Advertisement

7) Monitor your financial accounts

Because ZeroDayRAT targets banking and crypto apps, watch your accounts closely for unusual transactions. Contact your bank immediately if you see suspicious activity.

When to replace the device

In rare cases, if the phone was deeply compromised or jailbroken, replacing the device may be the safest option. While that sounds extreme, protecting your identity and finances is worth more than the cost of a new phone.

Ways to stay safe from ZeroDayRAT spyware

The good news is that you still have control over your digital safety. Start with these practical steps to reduce your risk of infection and limit the damage if spyware ever targets your phone.

1) Avoid sideloading apps

Only install apps from the App Store or Google Play Store. Official stores screen apps for malicious code and remove threats when discovered. Do not download apps from links in emails or text messages. If an app asks you to install it from outside the store, treat that as a red flag.

2) Think before you tap and use strong antivirus protection

Do not click links from unknown senders. Even one tap can trigger a malicious download or redirect you to a fake login page. Install strong antivirus software on your mobile device. Good mobile security apps scan for spyware, block malicious websites and warn you about suspicious behavior in real time. Some also alert you if your personal information appears in known data breaches, which adds another layer of protection. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

3) Keep your phone updated

Install operating system updates as soon as they become available. Security updates patch vulnerabilities that spyware platforms like ZeroDayRAT try to exploit. Turning on automatic updates helps ensure you do not miss critical fixes.

4) Review app permissions regularly

Check which apps have access to your camera, microphone and location. Remove permissions that do not make sense. If a simple game wants constant microphone access, that should raise questions. Limiting permissions reduces what spyware can capture.

5) Use strong authentication

Turn on two-factor authentication (2FA) for banking, email and social media accounts. Even if spyware captures a password, that second verification step can stop attackers from logging in. Use a reputable password manager to create strong, unique passwords for every account.

6) Use a data removal service to reduce your exposure

Spyware operators often profile targets using personal data that is already available online. Data broker websites collect your phone number, address, relatives and more. A reputable data removal service can help remove your personal details from many of these sites. The less information criminals can gather about you, the harder it becomes to target you with convincing phishing attacks or social engineering.  Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

7) Do not bypass your phone’s built-in security protections

Some people modify their phones to remove manufacturer restrictions so they can install unofficial apps or customize the system. On an iPhone, this is called jailbreaking. On Android, it is known as rooting. While that may sound harmless, it removes important security safeguards that are designed to block spyware and malicious software. Once those protections are gone, threats like ZeroDayRAT have a much easier time installing and hiding on your device. Keeping your phone in its original security state adds a powerful layer of protection that most people never see but benefit from every day.

Advertisement

YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

Experts say the spyware can activate a phone’s microphone and camera without a user’s knowledge. (Karl-Josef Hildenbrand/picture alliance via Getty Images)

Kurt’s key takeaways

ZeroDayRAT spyware feels unsettling because it attacks something we rely on every day. Your phone holds your conversations, photos, financial apps and personal routines. When a single piece of malware can see your screen, hear your voice and track your location, the stakes get higher. The silver lining is this. Most infections still depend on user action. A bad link was clicked. A suspicious app was installed. A warning ignored. Staying cautious may not sound exciting, but it remains one of the strongest defenses you have.

Now here is the question worth asking. If spyware can already access your camera, messages and money in one package, are tech companies and app stores doing enough to protect you? Let us know your thoughts by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Related Article

Android malware hidden in fake antivirus app
Advertisement
Continue Reading

Technology

Nothing couldn’t wait to show off the Phone 4A

Published

on

Nothing couldn’t wait to show off the Phone 4A

After teasing the upcoming launch of its midrange Phone 4A last week, Nothing has now revealed what the rear of the device looks like. An official render of the Phone 4A shared on X shows off the brand’s familiar transparent-industrial stylings, alongside a new “Glyph Bar” lighting feature located to the right of the triple camera island.

This Glyph Bar features nine individually controllable mini-LEDs that appear as a line of seven square lights — six white, and one red — replacing the three LED light strips that surround the camera on Nothing’s 3A devices. Nothing says that the Glyph Bar is 40 percent brighter than the previous A-series’ lights and uses patented tech to provide “a more natural, neutral, bleed-free glow.”

Nothing hasn’t shared much else about the Phone 4A series besides confirming it’ll be running a Snapdragon chip. Full specifications, price, and availability might not be announced until it launches on March 5th. Nothing CEO Carl Pei has confirmed that there won’t be a Phone 4 this year, however, so last year’s Phone 3 will remain the current flagship for now.

Continue Reading

Trending