over 900,000 users
Security researchers from OX Security have exposed a large-scale data theft operation affecting over 900,000 users of Google Chrome. The campaign utilized two malicious browser extensions, "Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI" and "AI Sidebar with Deepseek, ChatGPT, Claude and more," which masqueraded as legitimate AI tools. Once installed, these extensions would steal complete conversation transcripts from AI services like ChatGPT and DeepSeek, as well as general browsing data. All stolen information was exfiltrated to an attacker-controlled server, deepaichats[.]com. The incident highlights the growing risk of malicious browser extensions, especially as users increasingly adopt AI-related tools.
The attack leveraged the trust users place in the official Chrome Web Store, with one of the malicious extensions even gaining a "Featured" badge, which likely boosted its installation numbers. The two extensions successfully impersonated a legitimate tool called AITOPIA, deceiving users into granting them broad permissions.
The primary goal of the malware was to harvest data from popular AI chat platforms. As employees and individuals increasingly use these tools for work, the stolen data could include proprietary source code, confidential business strategies, marketing plans, and personally identifiable information (PII).
The core of the malware's operation was its permission request to "read and change all your data on all websites." Once granted, the extensions used this access to:
T1176 - Browser Extensions)deepaichats[.]com. (T1041 - Exfiltration Over C2 Channel)The compromise of over 900,000 users represents a significant data breach with far-reaching consequences:
| Type | Value | Description |
|---|---|---|
| domain | deepaichats[.]com |
Command-and-control server used for data exfiltration. |
deepaichats[.]com. Block this domain at the network perimeter. (D3-DNSDL: DNS Denylisting)Use enterprise policies to create an allowlist of approved browser extensions, preventing users from installing untrusted or malicious ones.
Educate users to be skeptical of browser extensions, especially those requesting broad permissions like access to all website data.
Use network filtering and DNS denylisting to block connections to known malicious domains like the C2 server used in this attack.
To combat the threat of malicious browser extensions, organizations should implement a form of executable denylisting or, more effectively, allowlisting within their browser management policies. This involves creating a curated list of approved, vetted extensions that employees are permitted to install. All other extensions from the Chrome Web Store would be blocked by default. This approach directly prevents the initial installation of threats like the 'Chat GPT for Chrome' malware. This policy should be enforced via enterprise browser management tools (e.g., Google Workspace Admin Console) and should be coupled with a formal process for employees to request and vet new extensions for business use. This shifts the security model from a reactive cleanup to a proactive prevention of the initial compromise.
Outbound traffic filtering is a critical detective and preventative control against data exfiltration by malicious extensions. Security teams must block the known command-and-control domain, deepaichats[.]com, at the network edge using firewalls, web proxies, or DNS sinkholing. This action will sever the connection between any already-compromised browsers and the attacker's server, preventing further data theft. More strategically, organizations should implement egress filtering policies that restrict outbound connections from user endpoints to only known-good, categorized domains. Alerting on high-volume data transfers or connections to newly registered or uncategorized domains can help detect zero-day C2 infrastructure.
To detect the behavior of data-stealing extensions, organizations can leverage tools that perform web session activity analysis. This could involve endpoint agents or CASB (Cloud Access Security Broker) solutions that monitor DOM manipulation and API calls within the browser. In the context of this attack, such a tool could detect the malicious extension's script scraping the contents of ChatGPT or DeepSeek web pages. Alerts could be configured for behavior such as an extension reading large amounts of data from a specific website's text fields without user interaction, or making frequent, repeated calls to local browser storage. This provides a behavior-based detection method that does not rely solely on known IOCs and can identify novel threats.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats