Technology
Malicious browser extensions hit 4.3M users
NEWYou can now listen to Fox News articles!
A long-running malware campaign quietly evolved over several years and turned trusted Chrome and Edge extensions into spyware. A detailed report from Koi Security reveals that the ShadyPanda operation affected 4.3 million users who downloaded extensions later updated with hidden malicious code.
These extensions began as simple wallpaper or productivity tools that looked harmless. Years later, silent updates added surveillance functions that most users could not detect.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
THIS CHROME VPN EXTENSION SECRETLY SPIES ON YOU
Malicious extensions spread through trusted browsers and quietly collected user data for years. (Kurt “CyberGuy” Knutsson)
How the ShadyPanda campaign unfolded
The operation included 20 malicious Chrome extensions and 125 on the Microsoft Edge Add-ons store. Many first appeared in 2018 with no obvious warning signs. Five years later, the extensions began receiving staged updates that changed their behavior.
Koi Security found that these updates rolled out through each browser’s trusted auto-update system. Users did not need to click anything. No phishing. No fake alerts. Just quiet version bumps that slowly turned safe extensions into powerful tracking tools.
NEW EMAIL SCAM USES HIDDEN CHARACTERS TO SLIP PAST FILTERS
WeTab functions as a sophisticated surveillance platform disguised as a productivity tool. (Koi)
What the extensions were doing behind the scenes
Once activated, the extensions injected tracking code into real links to earn revenue from user purchases. They also hijacked searches, redirected queries and logged data for sale and manipulation. ShadyPanda gathered an unusually broad range of personal information, including browsing history, search terms, cookies, keystrokes, fingerprint data, local storage, and even mouse movement coordinates. As the extensions gained credibility in the stores, the attackers pushed a backdoor update that allowed hourly remote code execution. That gave them full browser control, letting them monitor websites visited and exfiltrate persistent identifiers.
Researchers also discovered that the extensions could launch adversary-in-the-middle attacks. This allowed credential theft, session hijacking and code injection on any website. If users opened developer tools, the extensions switched into harmless mode to avoid detection. Google removed the malicious extensions from the Chrome Web Store. We reached out to the company, and a spokesperson confirmed that none of the extensions listed are currently live on the platform.
Meanwhile, a Microsoft spokesperson told CyberGuy, “We have removed all the extensions identified as malicious on the Edge Add-on store. When we become aware of instances that violate our policies, we take appropriate action that includes, but is not limited to, the removal of prohibited content or termination of our publishing agreement.”
Most of you will not need the full technical IDs used in the ShadyPanda campaign. These indicators of compromise are primarily for security researchers and IT teams. Regular users should focus on checking your installed extensions using the steps in the guide below.
You can review the full list of affected Chrome and Edge extensions to see every ID tied to the ShadyPanda campaign by clicking here and scrolling down to the bottom of the page.
How to check whether your browser contains these extension IDs
Here is an easy, step-by-step way for you to verify if any malicious extension IDs are installed.
For Google Chrome
Open Chrome.
Type chrome://extensions into the address bar.
Press Enter.
Look for each extension’s ID.
Click Details under any extension.
Scroll down to the Extension ID section.
Compare the ID with the lists above.
If you find a match, remove the extension immediately.
For Microsoft Edge
Open Edge.
Type edge://extensions into the address bar.
Press Enter.
Click Details under each extension.
Scroll to find the Extension ID.
If an ID appears in the lists, remove the extension and restart the browser.
183 MILLION EMAIL PASSWORDS LEAKED: CHECK YOURS NOW
Simple security steps can block hidden threats and help keep your browsing safer. (Kurt “CyberGuy” Knutsson)
How to protect your browser from malicious extensions
You can take a few quick actions that help lock down your browser and protect your data.
1) Remove suspicious extensions
Before removing anything, check your installed extensions against the IDs listed in the section above. Most of the malicious extensions were wallpaper or productivity tools. Three of the most mentioned are Clean Master, WeTab and Infinity V Plus. If you installed any of these or anything that looks similar, delete them now.
2) Reset your passwords
These extensions have access to sensitive data. Resetting your passwords protects you from possible misuse. A password manager makes the process easier and creates strong passwords for each account.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
3) Use a data removal service to reduce tracking
ShadyPanda collected browsing activity, identifiers and behavioral signals that can be matched with data already held by brokers. A data removal service helps you reclaim your privacy by scanning people-search sites and broker databases to locate your exposed information and remove it. This limits how much of your digital footprint can be linked, sold or used for targeted scams.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
4) Install strong antivirus software
An antivirus may not have caught this specific threat due to the way it operated. Still, it can block other malware, scan for spyware and flag unsafe sites. Many antivirus tools include cloud backup and VPN options to add more protection.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
5) Limit your extensions
Each extension adds risk. Stick with known developers and search for recent reviews. If an extension asks for permissions it should not need, walk away.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
ShadyPanda ran for years without raising alarms and proved how creative attackers can be. A trusted extension can shift into spyware through a silent update, which makes it even more important to stay alert to changes in browser behavior. You protect yourself by installing fewer extensions, checking them from time to time and watching for anything that feels out of place. Small steps help lower your exposure and reduce the chances that hidden code can track what you do online.
Have you ever found an extension on your browser that you didn’t remember installing or one that started acting in strange ways? How did you handle it? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alert, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Apple smart home display rumors now point to a fall launch with iOS 27
The rumored “HomePod with a screen” we’ve heard so much about was reportedly lined up for launch in 2025, and then this spring, and now, according to the latest updates, it’s on the shelf until this fall. Leaker Kosutami posted as much on X last week, and today, Bloomberg reporter Mark Gurman followed up with similar information, saying its robot arm-equipped cousin is now planned for launch in 2027.
That was supposed to be ready by now, but it is now predicted to arrive later this year, along with the iPhone 18 Pro plus 2027 updates for iOS, macOS, and all the rest. He describes a silver aluminum-cased device with a 7-inch screen and USB-C power port running a version of tvOS 27, while new versions of the HomePod speaker and Apple TV 4K box are also waiting in the wings for that Siri update, and a smart home sensor is in the works, too.
Technology
Fake Google Gemini AI pushes ‘Google Coin’ crypto scam
NEWYou can now listen to Fox News articles!
You may think you can spot a crypto scam from a mile away. But what if the pitch comes from what looks like an official Google AI assistant, answering your questions in real time and showing projected profits? That is exactly what scammers are doing now. Security researchers at Malwarebytes, a cybersecurity company known for tracking malware and online scams, recently uncovered a live “Google Coin” presale site featuring a chatbot that claimed to be Google’s Gemini AI.
The bot walked visitors through an investment pitch, gave detailed return estimates and guided them to send cryptocurrency payments. Google does not have a cryptocurrency. Yet the site looked polished and professional, convincing enough to appear legitimate at first glance.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
BE AWARE OF EXTORTION SCAM EMAILS CLAIMING YOUR DATA IS STOLEN
Security researchers at Malwarebytes uncovered a polished crypto scam that falsely claims Google launched a new digital coin. (Photo by Helena Dolderer/picture alliance via Getty Images)
What you need to know about the “Google Coin” crypto scam
Researchers discovered a fraudulent website promoting a fake cryptocurrency called “Google Coin.” The site was designed to look like it belonged to Google and claimed the project was connected to its AI assistant, Gemini.
At the center of the scam was a chatbot that introduced itself as “Gemini, your AI assistant for the Google Coin platform.” It used familiar branding and visuals to make visitors believe they were interacting with a legitimate Google product.
When asked simple investment questions, the chatbot gave specific financial projections. For example, it claimed that buying 100 tokens at $3.95 each could turn into more than $2,700 once the coin was “listed.” The site displayed fake progress counters, countdowns and claims of millions of tokens already sold. Once someone clicked “Buy,” they were instructed to send Bitcoin to a specific wallet address. The payment was final and irreversible.
There is no official Google Coin. The entire operation was built to collect cryptocurrency from unsuspecting investors.
How the “Google Coin” crypto scam works
This scam combines two powerful tricks: brand impersonation and artificial intelligence. First, the scammers created a website that mimics Google’s look and feel, including logos, design, and tech language. Then they layered in a chatbot that acts like a real AI assistant. Because many people are now used to chatting with AI tools, this interaction seemed normal and legitimate.
The chatbot is programmed with a tight script. It answers questions confidently, avoids admitting risk, and refuses to acknowledge the possibility of a scam. If you ask about company registration or regulation, it deflects with vague promises about security and transparency.
This means you are not debating with a clumsy scammer over email. You are interacting with software designed to persuade you around the clock. The chatbot can talk to hundreds of people at once, give each one personalized answers and push them toward sending cryptocurrency. Once you send it, your money is gone.
This type of scam is dangerous because it’s interactive and appears credible. When a chatbot answers your questions in real time, it can lower your guard. You might think, “If this were fake, it would not sound so professional.” But that is exactly the point. AI allows scammers to scale up their confidence and polish.
If you fall for it, the financial loss can be immediate and permanent. Cryptocurrency payments cannot be reversed like credit card charges. There is no customer support line to call. There is no refund process.
Even worse, once you engage with a scam site, your contact details, email or wallet address could be added to lists that circulate among fraud groups. That can make you a target for future investment scams, phishing emails or impersonation attempts.
We reached out to Google for comment but did not hear back before our deadline.
SPOTIFY VOTING SCAM EXPOSED
Scammers are using a fake “Google Coin” presale site with a chatbot posing as Google’s Gemini AI to lure investors into sending cryptocurrency. (Photo by Thomas Trutschel/Photothek via Getty Images)
7 ways you can protect yourself from a crypto scam
Crypto scams are getting more sophisticated, especially with AI tools that make fake investments look polished and legitimate. The good news is that you can dramatically lower your risk by taking a few smart precautions before you invest or send any digital currency.
1) Be skeptical of “new” coins tied to famous brands
If you see a cryptocurrency claiming to be launched by a well-known company, verify it directly on the company’s official website. Major corporations publicly announce major financial products. If you cannot find confirmation on the company’s real domain, assume it is fake and walk away.
2) Never trust guaranteed or specific return projections
No legitimate investment can promise that your $395 will turn into $2,700. When a chatbot gives exact future prices or guaranteed multipliers, that is a red flag. Real investments carry risk and uncertainty. Promises of quick, predictable profits are classic scam tactics.
3) Use a password manager
A password manager creates strong, unique passwords for each of your accounts and stores them securely. If scammers trick you into entering credentials on a fake site, unique passwords prevent them from accessing your other accounts. Many password managers also alert you if your information appears in known data breaches. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
4) Install antivirus software
Strong antivirus software helps detect malicious websites, phishing attempts, and suspicious downloads before they can harm your device. It adds another layer of protection if you accidentally click a dangerous link. This can stop hidden malware from being installed while you are distracted by a convincing scam pitch. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
5) Consider identity theft protection
An identity theft protection service monitors your personal information, such as your Social Security number or email, and alerts you if it is being misused. If scammers collect your details through a fake investment site, early alerts can help you act quickly before financial damage spreads. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.
6) Use a personal data removal service
Data removal services work to remove your personal details from public data broker sites. The less personal information available about you online, the harder it is for scammers to target you with personalized pitches. Reducing your digital footprint lowers your overall exposure to fraud. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
7) Slow down before sending cryptocurrency
Crypto payments are fast and irreversible. Before sending any digital currency, pause and verify the recipient independently. Search for reviews, warnings, and official announcements. If the investment requires urgency, such as a countdown or “final stage” message, treat that pressure as a warning sign.
300,000 CHROME USERS HIT BY FAKE AI EXTENSIONS
The AI-powered scam mimics Google branding and uses real-time chat to build trust before requesting irreversible crypto payments. Google does not have a cryptocurrency, despite claims on a convincing “Google Coin” investment website. (Photo by Thomas Trutschel/Photothek via Getty Images)
Kurt’s key takeaway
Scammers are no longer relying only on clumsy emails or obvious red flags. They are using artificial intelligence to create polished, persuasive conversations that feel real and responsive. When that fake AI wears the face of a trusted brand, it becomes even more convincing. The good news is that awareness is powerful. If you take a moment to verify claims, question guaranteed returns, and use protective tools, you dramatically reduce your risk.
Do you think AI is making online scams harder to recognize than they were a few years ago? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Google’s latest Pixel Watches have fallen to their lowest prices ever
With longer days and warmer weather on the way, it’s a good time to take your gym routine outside. Luckily, Google’s Pixel Watch 4 can help you track all your outdoor fitness activities, and right now it’s on sale at Amazon, Best Buy, and Target starting at $289.99 ($60 off), a new low price. The last-gen Pixel Watch 3 is also currently the cheapest it’s ever been, with the 41mm / Wi-Fi configuration selling for $169.99 ($80 off) — also a new low — at Amazon, Best Buy, and Target.
The Pixel Watch 4 is our favorite Fitbit-powered smartwatch, one that offers a great feature set for the price. Google’s latest wearable features dual-frequency GPS, which improves accuracy in challenging environments such as cities and dense forests, and it can automatically record certain cardio activities on your behalf, including both running and cycling. It also offers improved sleep tracking, satellite SOS (on the LTE model), and a slew of AI features courtesy of Gemini — including an exclusive raise-to-talk gesture that’s useful while on a run.
The hardware has improved as well. Most notably, you can now replace and repair both the screen and the battery, making it a better long-term investment. The display is bigger and brighter, too, and the Pixel Watch 4 lasts about a day and a half on a single charge, or roughly 45 hours if you buy the 45mm model (up from 32 hours on the Watch 3). Charging is also faster, allowing you to charge it up to 80 percent capacity in under 30 minutes. And as a nice little extra, the included side-mounted charger lets you use the watch as a glanceable display, so you can see the battery percentage and other useful tidbits of info more easily.
If you want a great Android smartwatch for less, the last-gen Pixel Watch 3 is also a good option. While it’s not easily repairable like the Watch 4 and lacks some of the aforementioned upgrades (including dual-frequency GPS), it still offers a good set of health and fitness tools, allowing you to track your activity, sleep, blood oxygen levels, and heart rate. It also supports Gemini and integrates well with Google’s various services, letting you download offline maps and leave your wallet at home by paying via Google Wallet. You can even use it to control a slew of compatible devices from your wrist, from Nest cameras and video doorbells to the newest Google TV devices.
-
Wisconsin1 week agoSetting sail on iceboats across a frozen lake in Wisconsin
-
Massachusetts1 week agoMassachusetts man awaits word from family in Iran after attacks
-
Maryland1 week agoAM showers Sunday in Maryland
-
Florida1 week agoFlorida man rescued after being stuck in shoulder-deep mud for days
-
Pennsylvania5 days agoPa. man found guilty of raping teen girl who he took to Mexico
-
News1 week ago2 Survivors Describe the Terror and Tragedy of the Tahoe Avalanche
-
Sports5 days agoKeith Olbermann under fire for calling Lou Holtz a ‘scumbag’ after legendary coach’s death
-
Virginia6 days agoGiants will hold 2026 training camp in West Virginia