Technology
Hacked Chrome extensions put 2.6 million users at risk of data leak
Your web browser is an ecosystem of its own. It stores your passwords, search history, financial details like credit card numbers, addresses and more. Just like how malicious apps and services can compromise data on your phone or PC, malicious extensions can expose the data stored in your browser.
There are a ton of extensions out there that do more harm than good. In fact, security researchers have just found a dangerous new campaign that is going after browser extensions. So far, around 36 extensions have been compromised, putting over 2.6 million Chrome users at risk of having their browsing data and account credentials exposed.
I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my free newsletter.
A person using a Chrome browser extension (Kurt “CyberGuy” Knutsson)
How hackers are targeting browser extensions
Hackers are exploiting browser extensions as a gateway to steal sensitive user data through a variety of methods. These compromised extensions are exposing over 2.6 million users to data exposure and credential theft, as reported by The Hacker News.
One common attack involves phishing campaigns targeting the publishers of legitimate extensions on platforms like the Chrome Web Store. In these campaigns, attackers trick developers into granting permissions to malicious applications, which then insert harmful code into popular extensions. This code can steal cookies, access tokens and other user data.
The first company to shed light on the campaign was cybersecurity firm Cyberhaven, one of whose employees were targeted by a phishing attack on December 24, allowing the threat actors to publish a malicious version of the extension.
Once these malicious extensions are published and pass the Chrome Web Store’s security review, they are made available to millions of users, putting them at risk of data theft. Attackers can use these extensions to exfiltrate browsing data, monitor user activity and even bypass security measures such as two-factor authentication.
In some cases, developers themselves may unknowingly include data-gathering code as part of a monetization software development kit, which stealthily exfiltrates detailed browsing data. This makes it difficult to determine whether a compromise is the result of a hacking campaign or an intentional inclusion by the developer.
Image of a Chrome browser on a cellphone (Kurt “CyberGuy” Knutsson)
MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC
Remove these extensions from your web browser
The browser extension security platform Secure Annex has launched its own investigation into this hacking campaign. So far, it has uncovered over twenty additional compromised extensions, which are listed below. If you have any of the compromised extensions listed in Secure Annex’s investigation installed on your browser, it’s essential to remove them immediately to protect your data.
- AI Assistant – ChatGPT and Gemini for Chrome
- Bard AI Chat Extension
- GPT 4 Summary with OpenAI
- Search Copilot AI Assistant for Chrome
- TinaMInd AI Assistant
- Wayin AI
- VPNCity
- Internxt VPN
- Vindoz Flex Video Recorder
- VidHelper Video Downloader
- Bookmark Favicon Changer
- Castorus
- Uvoice
- Reader Mode
- Parrot Talks
- Primus
- Tackker – online keylogger tool
- AI Shop Buddy
- Sort by Oldest
- Rewards Search Automator
- ChatGPT Assistant – Smart Search
- Keyboard History Recorder
- Email Hunter
- Visual Effects for Google Meet
- Earny – Up to 20% Cash Back
- Cyberhaven security extension V3
- GraphQL Network Inspector
- Vidnoz Flex – Video recorder & Video share
- YesCaptcha assistant
- Proxy SwitchyOmega (V3)
- ChatGPT App
- Web Mirror
- Hi AI
Keeping these extensions installed is a serious risk since hackers can still access your data even if the malicious version has been taken down from the Chrome Web Store. Secure Annex is still investigating and has shared a public Google Sheet with details about the malicious extensions it has found so far, like whether they’ve been updated or removed. They’re also adding new extensions to the list as they discover them.
WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM
How to remove an extension from Google Chrome
If you have installed one of the above-mentioned extensions on your browser, remove it as soon as possible. To remove an extension from Google Chrome, follow these steps:
- Open Chrome and click the icon that looks like a piece of a puzzle. You’ll find it in the top-right corner of the browser.
- You can see all the active extensions now. Click the three dots icon next to the extension you want to remove and select Remove from Chrome.
- Click Remove to confirm
Steps to remove an extension from Google Chrome (Kurt “CyberGuy” Knutsson)
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS
7 ways to stay safe from malicious software
1) Verify emails and links before clicking: Many attacks begin with phishing emails that impersonate trusted entities like Google Chrome Web Store Developer Support. These emails often create a false sense of urgency, urging you to click on malicious links. Always verify the sender’s email address and avoid clicking on links without double-checking their authenticity. When in doubt, go directly to the official website rather than using a provided link.
2) Use strong antivirus software: Having strong antivirus software is an essential line of defense against malicious software. These tools can detect and block malicious code, even if it has been embedded in browser extensions. The best way to safeguard yourself from malicious links that install strong malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
3) Limit extension permissions: Be cautious about the permissions you grant to browser extensions. Many require access to sensitive data like browsing history, cookies or account information, but not all requests are necessary. Review what each extension asks for and deny permissions that seem excessive. If possible, opt for extensions with limited access to ensure your data remains protected.
4) Limit the number of extensions: Only install extensions that are genuinely needed and regularly review and uninstall those no longer in use.
5) Keep your browser updated: Always update your browser to the latest version. Updates often include critical security patches that protect against vulnerabilities exploited by malicious software. Using an outdated browser increases the risk of being targeted by attacks that could have been prevented with a simple update. Enable automatic updates to ensure you’re always protected. If you are unsure how to update your browser, check out my detailed guide for Google Chrome.
6) Regularly audit your extensions: Conduct periodic reviews of installed extensions and remove any that are unnecessary or pose potential security risks.
7) Report suspicious extensions: If you encounter a suspicious extension, report it to the official browser extension marketplace.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Kurt’s key takeaway
Hackers are getting smarter, and browser extensions have become a new favorite target for stealing sensitive data. The discovery of over 35 compromised Chrome extensions, putting 2.6 million users at risk, is a wake-up call for everyone. Removing suspicious extensions is an essential step to protect your data. This also puts Google’s Chrome Web Store review process under scrutiny, proving that even trusted platforms can be exploited.
How often do you review and remove unused or suspicious browser extensions? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions: New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
OpenAI keeps shuffling its executives in bid to win AI agent battle
OpenAI announced yet another reorganization Friday, consolidating certain areas and making company president Greg Brockman the official lead of all things product.
In a memo viewed by The Verge, Brockman wrote that since OpenAI’s product strategy for this year is to go all-in on AI agents, the company is combining its products to “invest in a single agentic platform and to merge ChatGPT and Codex into one unified agentic experience for all.”
To do this, the company is making a suite of org chart changes, although it’s still operating under some of the same ones from last month. That’s when AGI boss Fidji Simo went on medical leave and OpenAI announced that Brockman would be in charge of product strategy and CSO Jason Kwon, CFO Sarah Friar, and CRO Denise Dresser would take control of business operations.
It’s all part of OpenAI’s recent strategic shift to focus on key revenue drivers like coding and enterprise and stop pouring resources into “side quests” ahead of its potential IPO later this year and amid investor pressure to turn a profit.
In Simo’s continued absence, Brockman’s role leading product strategy is now official, as well as the company’s “scaling” arm. Under Brockman will be four different pillars. The first is core product and platform, led by Thibault Sottiaux, who has been OpenAI’s engineering lead for Codex, and the second is critical enterprise industries, led by ChatGPT head Nick Turley. Third is the consumer pillar, such as health, commerce, and personal finance, which will be led by Ashley Alexander, who has been its healthcare products VP. The fourth pillar — core infrastructure, ads, data science, and growth — will be led by Vijaye Raji, who has been OpenAI’s CTO of applications.
Brockman wrote in the memo that OpenAI’s goal is now to “bring agents to ChatGPT scale, in order to give individuals and organizations significantly more value and utility from our products.”
Technology
Is that traffic ticket text a scam or real?
NEWYou can now listen to Fox News articles!
You’re going about your day when your phone buzzes. A text hits your phone. It looks official. It sounds urgent. And suddenly, you are being told you owe money for a traffic violation. That is exactly what Todd from Texas experienced. He emailed us and said:
“I received this text message today. It was so baffling because I haven’t lived in California for nearly a decade. I didn’t click on anything or respond. How can I tell if this is for real or if this is a scam?”
If you’ve gotten a message like this, you are not alone. This type of scam is spreading fast, and it is designed to pressure you into acting before you think. Let’s break down what is really going on.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
FAKE AGENT PHONE SCAMS ARE SPREADING FAST ACROSS THE US
This message may look official, but several red flags show it is likely a scam designed to pressure you into paying quickly. (Kurt “CyberGuy” Knutsson)
What the traffic ticket scam text looks like
At first, the message seems convincing. It claims to be a “final reminder” from the California DMV, and it warns of penalties like license suspension and added fees. It even includes a link that appears somewhat official. However, once you slow down and take a closer look, the red flags quickly start to pile up.
The biggest red flags in this message
Here are the key warning signs to watch for in messages like this.
9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU
1) The phone number makes no sense
The message comes from a number with a +63 country code. That is the Philippines, not California. Government agencies in the U.S. do not send official legal notices from international numbers. That alone is a major warning sign.
2) No name, just “Dear Driver”
Legitimate notices from a DMV or court almost always include your full name or at least some identifying information. “Dear Driver” is vague on purpose. It allows scammers to send the same message to thousands of people.
3) The link isn’t a real DMV website
The message includes this link:
ca.mnvtl.life/dmv
That isn’t a government domain. Official DMV websites in California use “.ca.gov” or similar trusted domains. Scammers often create lookalike links to trick you into clicking.
4) Urgency and threats
The message pushes you to act quickly with a deadline. It lists consequences like license suspension and extra charges. Scammers rely on fear. When you feel rushed, you are more likely to click without thinking.
FBI WARNS OF DANGEROUS NEW ‘SMISHING’ SCAM TARGETING YOUR PHONE
5) Asking you to reply to proceed
The text says to reply with “Y” to get instructions. That is another trap. Responding confirms your number is active, which can lead to more scam messages.
6) Generic language and odd phrasing
Parts of the message feel slightly off. The tone is formal but not quite right. That subtle awkwardness is common in scam messages sent to large groups of people.
7) Overloaded threats designed to scare you
The message piles on consequences like license suspension, added fees, court action and even credit damage. In this case, it even mentions a license suspension and a $160 late payment charge. That combination is meant to overwhelm you and push you to act fast. Real agencies usually provide clear, specific notices, not a long list of escalating threats in a single text.
INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU
Scam texts like this often arrive out of nowhere and try to create urgency before you have time to question them. (Kurt “CyberGuy” Knutsson)
What this means for you
Even if you have never driven in California, you could still receive this message. Scammers cast a wide net and hope someone takes the bait. If you click the link, you could be taken to a fake payment page. That page may ask for your credit card details, personal information or login credentials. In some cases, it can also install malware on your device or redirect you to credential-stealing pages. This isn’t about a ticket. It is about getting your data. State DMVs typically do not send final legal notices or payment demands by text message.
Why these scams keep working
These messages work because they tap into something most people fear. Legal trouble, fines and losing driving privileges. They also look just real enough to pass a quick glance. That is all scammers need. As more services move online, these scams will continue to evolve.
Unlike typical DMV scams, this message impersonates a court and escalates the threats to make the situation feel more serious (Kurt “CyberGuy” Knutsson)
Ways to stay safe from traffic ticket text scams
Start with a simple rule. Never trust a payment request that shows up out of nowhere. Here are practical steps you can take:
1) Do not click the link
If you are unsure, do not tap anything in the message. That includes links and reply options.
2) Use strong antivirus software
If you accidentally click a link, strong antivirus software can help detect malware and protect your data. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
3) Verify directly with the DMV
Go to your state’s official DMV website by typing it yourself into your browser. Do not use the link in the text.
4) Check the sender carefully
Look at the phone number. International numbers or random strings are a clear warning sign.
5) Ignore generic greetings
Real notices will usually include your name or case details. Vague language is a red flag.
6) Consider a data removal service
Scammers often get your number from data broker sites. Removing your personal info from those databases with a data removal service can reduce these messages. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
7) Block and report the number
On your phone, block the sender and report it as spam. This helps reduce future attempts.
8) Turn on spam filtering
Enable spam filtering on your phone or through your carrier to catch more of these messages before they reach you.
Kurt’s key takeaways
Todd did the right thing. He paused, questioned the message and did not click. That one decision likely saved him from handing over personal information. When it comes to messages like this, skepticism is your best defense. If something feels off, trust that instinct.
Should phone carriers and tech companies be doing more to block scams like this before you ever see them? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Honda’s hybrid future starts with new Accord and RDX prototypes
Honda revealed prototypes of two new hybrid models, an Accord sedan and the Acura RDX SUV, during its annual business briefing this week, built on a platform that it says will begin launching next year. The RDX was announced earlier this year as Honda’s first SUV to feature the next-gen version of its two-motor hybrid system.
In March, Honda announced it would take a writedown of up to 2.5 trillion yen ($15.7 billion) on its EV investments. Now Honda says its EV-related losses will be “resolved” by 2029, and that it will reevaluate its EV plans in 2030.
-
Hawaii3 minutes agoMan accused of stabbing teen in Kalihi charged, held on $100K bail
-
Idaho9 minutes ago“Mamas know best”: Idaho Fish and Game Warns against interfering with spring baby animals – LocalNews8.com
-
Illinois15 minutes agoIllinois, Brad Underwood agree to new contract terms
-
Indiana21 minutes agoIndiana gambling case, Bears schedule and McDonald’s Park | Week in Review
-
Iowa28 minutes agoTwo separate traffic stops leads to four arrests in Iowa County
-
Kentucky39 minutes agoKentucky Newsmakers 5/17: Congressional candidate Erin Petrey; Visit Lex President Mary Quinn Ramer
-
Louisiana46 minutes agoLive Results: Louisiana midterm state and congressional primaries
-
Maine52 minutes agoMaineHealth Maine Medical conference highlights trauma care challenges