Global enthusiasm for artificial intelligence has created fertile ground for new cyber threats, pushing hundreds of thousands of users to download tools that promise to improve productivity but that, in reality, operate as sophisticated surveillance tools.
A recent investigation conducted by security researchers from LayerX has uncovered a wide operation named “AiFrame“, which involves about thirty extensions for the Google Chrome browser.
These add-ons, masquerading as virtual assistants and translators based on GPT or Gemini, have been designed to steal credentials, read the content of personal communications and monitor browsing activity.
Although some of these applications have been removed from the Chrome Web Store, many could still be present on devices or accessible via online repositories.
It is essential to immediately verify whether any of the following components are installed in your browser, identified by BleepingComputer and LayerX with their respective identifiers and the approximate number of affected users:
It is worth noting that the names may vary slightly, but the internal structure and illicit purposes remain identical for all variants involved in the campaign.
The analysis revealed that all extensions share the same JavaScript logic and communicate with a single backend infrastructure under the domain “tapnetic.pro“.
The method used to bypass security checks is particularly insidious. These add-ons do not implement AI capabilities locally. Instead, they generate a full-screen window (iframe) that loads content directly from the remote domain controlled by the attackers.
This strategy allows cybercriminals to modify the extension’s behavior at any time, adding malicious features without releasing an official update that would require a new Google review.
The most critical aspect revealed by the report concerns the specific activity on Gmail. About half of the catalogued extensions include dedicated scripts that activate as soon as the user signs into their mailbox (mail.google.com).
Using libraries to extract text, the software is able to read and copy the content of visible emails, including drafts not yet sent. When the user requests a summary or an AI-assisted reply, the data is transmitted to external servers, leaving Google’s account security perimeter for good.
In some cases, leveraging the Web Speech APIs, the extensions can even activate the microphone to transcribe and send ambient conversations.
In light of such evidence, the recommendation is simple: remove immediately any extension listed or of dubious origin and proceed to change passwords for all sensitive accounts used during the infection period.
Google is preparing to introduce a brand-new device for its wearables lineup, entering direct competition…
Recently Vivo announced its new Camera Phone for the Chinese market, with a major novelty…
Google seems intent on tightening protection measures related to software on its newer smartphones. According…
The market for TWS headphones is now saturated, with fierce competition among brands to offer…
The company founded by Carl Pei aims to expand its product ecosystem well beyond smartphones.…
A few days after the renders dedicated to the standard model, we are back to…