The story is repeated with a more sophisticated variant: security researchers have discovered a new set of 17 browser extensions linked to the campaign known as GhostPoster, which in total accumulated about 840,000 facilities before being removed from official stores. The striking is not only the volume, but the technique used by the attackers: a malicious code camouflaged within images and files included in the extensions themselves, with a phased execution flow designed to avoid static and behavioural controls.
The first alarm was given by Koi Security analysts at the end of last year, when they described extensions that hidden malicious JavaScript in icons. This code, once activated, downloaded futile charges from external resources, monitored the navigation activity, manipulated affiliate links on large e-commerce platforms and mounted invisible iframes to generate click and advertising fraud. If you want to see the work of that first finding, you can start with the Koi Security page at koi.security, where they publish investigations and notices about malicious extension campaigns.

A new report from the security platform Browser LayerX confirms that the campaign was not extinguished after the initial exhibition and details the 17 extensions involved in this round, many with names that mimic legitimate functions such as translators, ad blockers or video download tools. LayerX found that some of these supplements have been in official repositories for years, with a documented presence since 2020, suggesting a long-term operation that has been able to stay under radar. You can read the LayerX analysis on your official site at layerx.ai where they explain the technical evolution of GhostPoster.
Among the technical developments highlighted by LayerX is the evolution towards a more robust execution in several phases: in addition to hiding code in icons, the attackers began to pack the malicious load within images included in the extension and to move the logic of preparation to the background script (background script) of the extension itself. In running time, that script reads the raw bytes of the image looking for a specific delimiter (the report mentions a sequence as "> > > >"), extracts the hidden data, stores them temporarily and then decodifies them from Base64 to run them as JavaScript. This mechanism increases latency time before activation and complicates detection by tools that analyze only visible content or the most obvious files.
The purpose of this payload is varied and harmful: persistent monitoring of pages that visit, redirecting or handling affiliate links to steal commissions, and the invisible insertion of iframes that generate fraudulent impressions and clicks. All these actions not only affect the privacy of the victim, but can also cause economic losses to users, businesses and advertising networks. LayerX stresses that the modularity and sigil of the new pattern allow greater sleep and resistance to both static and dynamic filters.
Official platforms have reacted: according to news reports, Mozilla and Microsoft have already removed identified extensions from their stores, and Google confirmed the removal of affected versions of the Chrome Web Store. BleepingComputer covered the withdrawal and communications with Google; its portal is a good reference to follow the outcome and see which specific extensions were removed: bleepingcomputer.com. Still, removing an extension from the store does not eliminate its presence in the browsers of those who already installed it, so the risk persists between users with previous facilities.
If you are concerned about installing any of these extensions or any other strange behavior in the browser, there are concrete and useful actions that you can take immediately. First, check the list of installed extensions and remove any additions you do not recognize or need. The browsers offer extension management pages with step-by-step guides: for Chrome check Google's help in support.google.com, for Firefox Mozilla documentation in support.mozilla.org and for Edge the Microsoft instructions in support.microsoft.com. After removing the extension, it is recommended to delete local data linked to extensions (if the browser allows), clean cache and cookies, and, if you suspect that sensitive data could be compromised, rotate passwords and review access associated with important accounts.

In more serious scenarios, it is also appropriate to run an updated anti-malware analysis, review transactions and unusual activity in services linked to your navigation (online accounts, affiliate programs, etc.), and, if the extension had extensive permissions, consider creating a new browser profile or even migrating data to a clean installation to avoid persistent remains. Teams and administrators should audit the extensions installed on corporate devices, force policies that limit the installation to only verified supplements and monitor network logs in search of suspicious domain communications used to download oval loads.
The GhostPoster case highlights two important lessons: on the one hand, the desirability of not lowering the guard to seemingly harmless extensions - a translator or an image download can become attack vectors - and on the other, the need for continuous improvements in the surveillance of the extension stores and in the defenses that detect code hidden in binary and images. If you want to deepen the modus operandi and technical recommendations, the public reports of Koi Security and LayerX are a good starting point, and specialized media such as BleepingComputer provide follow-up to the mediation in the shops.
The final invitation is simple: Check your extensions calmly, remove the unnecessary and keep your browser up to date. The extensions make life easier for us, but they also open an entrance door if we do not manage them with caution.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...

PinTheft the public explosion that could give you root on Arch Linux
A new public explosion has brought to the surface again the fragility of the Linux privilege model: the V12 Security team named the failure as PinTheft and published a concept t...