Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Prompt Engineering Endorses ‘Cognitive Cognizance Prompting’ As A Vital Well-Being Technique

    January 20, 2026

    For These Women, Grok’s Sexualized Images Are Personal

    January 20, 2026

    Inside China’s buzzing AI scene a year after DeepSeek shock

    January 20, 2026
    Facebook X (Twitter) Instagram
    ailogicnews.aiailogicnews.ai
    • Home
    ailogicnews.aiailogicnews.ai
    Home»Deepseek»Malicious Chrome Extension Exposed for Stealing ChatGPT and DeepSeek Chats from 900,000 Users
    Deepseek

    Malicious Chrome Extension Exposed for Stealing ChatGPT and DeepSeek Chats from 900,000 Users

    AI Logic NewsBy AI Logic NewsJanuary 7, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Security researchers have uncovered a sophisticated data-stealing campaign targeting more than 900,000 Chrome users via two malicious browser extensions that impersonate legitimate AI tools and secretly exfiltrate ChatGPT and DeepSeek conversations to attacker-controlled servers.

    The discovery, reported by OX Security on December 29, 2025, reveals a coordinated threat operation exploiting user trust in AI productivity tools.

    The extensions “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” (600,000+ installations) and “AI Sidebar with Deepseek, ChatGPT, Claude and more” (300,000+ installations) masquerade as versions of AITOPIA, a legitimate AI sidebar tool, while embedding malicious data harvesting functionality that remains active despite Google’s review process.

     Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI
     Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI  

    The Attack Mechanism

    The malware operates through expansive browser permissions that grant it read access to all website content.

    Malware Analysis
    Malware Analysis

    When users interact with ChatGPT or DeepSeek platforms, the extensions capture complete conversation transcripts in real time, including prompts, AI responses, and associated metadata.

    The stolen data is initially stored locally before being transmitted to the command-and-control infrastructure at deepaichats[.]com every 30 minutes.

    Beyond conversation theft, the extensions monitor all browsing activity and extract complete URLs from open tabs, search queries, and URL parameters potentially compromising session tokens, authentication credentials, and sensitive search history.

    This breadth of data collection transforms the compromise into a critical information disclosure incident.

    The exfiltrated conversations are particularly damaging. Users often share proprietary source code, confidential business strategies, personally identifiable information, and sensitive corporate communications with AI models, assuming that platform-level security protections are in place.

    These extensions bypass such assumptions entirely, enabling direct access to unencrypted conversation content.

    The threat actors employ social engineering tactics, requesting user permission for “anonymous, non-identifiable analytics data” while harvesting complete conversation content.

    Furthermore, when users uninstall an extension, the alternative automatically opens in a new browser tab, a coordinated mechanism designed to maintain presence across the compromised user base.

    To obscure their infrastructure, attackers abuse Lovable, an AI-powered web development platform, to host fake privacy policies and redirection pages, deliberately complicating researcher attribution and takedown efforts.

    Notably, despite OX Security’s December 29 report and Google’s acknowledgment of the review, both extensions remained active on the Chrome Web Store as of publication.

    From the malicious extension’s description
    From the malicious extension’s description

    The first extension continues to display Google’s “Featured” badge, a seal of apparent legitimacy that likely increased its installation rate.

    Organizations face significant exposure. Employee installations of these extensions could result in unauthorized disclosure of intellectual property, customer data, confidential communications, and strategic business information.

    Affected users should immediately navigate to chrome://extensions/ to remove both malicious extensions and consider whether sensitive data shared through AI platforms requires mitigation.

    Indicators of Compromise

    Extension Name Extension ID Version SHA256 Hash
    Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI fnmihdojmnkclgjpcoonokmkhjpjechg 1.9.6 98d1f151872c27d0abae3887f7d6cb6e4ce29e99ad827cb077e1232bc4a69c00
    AI Sidebar with Deepseek, ChatGPT, Claude and more inhcgfpbfdjbjogdfjbclgolkmhnooop 1.6.1 20ba72e91d7685926c8c1c5b4646616fa9d769e32c1bc4e9f15dddaf3429cea7

    Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyber Press as a Preferred Source in Google.

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleIs OpenAI About To Buy Pinterest? What We Know
    Next Article Elon Musk’s xAI announces it has raised $20bn amid backlash over Grok deepfakes | Technology
    AI Logic News

    Related Posts

    Deepseek

    Inside China’s buzzing AI scene a year after DeepSeek shock

    January 20, 2026
    Deepseek

    DeepSeek’s 24/7 Operations Pow

    January 19, 2026
    Deepseek

    Post Techcast: the DeepSeek sh

    January 19, 2026
    Demo
    Top Posts

    Houston’s Small Biz Gets Smarter: H

    July 29, 20259 Views

    How To Rank First In ChatGPT Even If You’re New To AI

    March 29, 20259 Views

    OpenAI to Focus on Safety Amid Deception Risks

    January 4, 20266 Views
    Latest Reviews
    ailogicnews.ai
    © 2026 Lee Enterprises

    Type above and press Enter to search. Press Esc to cancel.