A new Malware-as-a-Service (MaaS) offering named 'Stanley' is being advertised on Russian-language cybercrime forums, providing a turnkey solution for criminals looking to conduct phishing and data theft campaigns. The service sells malicious Google Chrome extensions and, crucially, guarantees their successful publication on the official Chrome Web Store. This bypasses a major hurdle for attackers and leverages the trust users place in Google's official marketplace. The extensions are designed to spoof websites and steal user credentials. The 'Stanley' MaaS is indicative of the ongoing professionalization of cybercrime, where specialized services are packaged and sold, enabling a wider range of actors to deploy attacks.
'Stanley' operates as a classic MaaS platform, abstracting the technical complexity of malware development and distribution away from the end-user (the criminal). By focusing on malicious browser extensions, the service targets a lucrative vector for credential theft.
This model democratizes cybercrime, allowing actors with minimal technical skill to purchase and deploy a sophisticated attack tool.
While the exact techniques used by 'Stanley' extensions are not detailed, malicious browser extensions typically abuse the powerful permissions they are granted to compromise user security. Common techniques include:
To bypass the Chrome Web Store review, the 'Stanley' operators likely employ techniques such as:
For Users:
For Organizations:
Principle of Least Privilege: When installing any software, including browser extensions, only grant the minimum permissions necessary for it to function.
Enterprise Extension Management: In a corporate environment, centrally manage and restrict which browser extensions can be installed on company devices. This is the most effective defense.
Regular Audits: Periodically audit the extensions installed on your personal and work browsers. Remove any that are no longer needed or that seem suspicious.
In an enterprise context, using browser management policies to create an allowlist of approved extensions is the most effective mitigation.
Mapped D3FEND Techniques:
Training users to be skeptical of browser extensions and to scrutinize requested permissions can help prevent installation of malicious add-ons.
While not a direct mitigation for the extension itself, content filtering at the network level can block the extension from reaching its C2 server or known phishing domains.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats