For over seven years, one of the most silent and sophisticated malware campaigns went completely undetected by security systems. Behind this attack was a group known as DarkSpectre, which built a highly elaborate infrastructure to infiltrate popular browsers like Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, managing to affect 8.8 million users worldwide.
What’s most concerning is that this was not an isolated attack. The operation combined digital espionage, financial fraud, and corporate data theft, exploiting a very common weak spot: users’ trust when installing extensions that appeared safe and were available in official stores. A clear reminder that even in “trusted” environments, risks still persist.
How the Web Browser Attack Happened
This wasn’t a random or improvised attack. Behind it was a perfectly organized criminal operation that was carried out over years and on a large scale. The perpetrators launched at least three major campaigns and managed to control nearly 300 malicious extensions, all designed to go unnoticed.
These extensions achieved something key to their success: they appeared completely legitimate. They were available for years in official stores, racked up millions of downloads and positive reviews, and offered real features, which made almost no one suspicious of them. That false sense of security became the perfect channel for their spread.

The campaigns, known as ShadyPanda, GhostPoster, and Zoom Stealer, shared the same infrastructure and mode of operation, but each had very specific targets and different techniques. This segmentation allowed them to target different user profiles without triggering early alerts.
One of the factors that made this attack so dangerous was its delayed activation. The extensions didn’t show malicious behavior upon installation—they were “activated” later, through silent updates.
Combined with their constant maintenance over the years, the result was a textbook case of an advanced persistent threat, difficult to detect even for traditional security solutions.
The impact extended to extensions compatible with Chrome, Edge, Firefox, and Opera, affecting both individual users and businesses. In the case of ShadyPanda, the focus was on mass surveillance and manipulation of e-commerce traffic, altering search results and redirecting visits without the user noticing. Meanwhile, GhostPoster specialized in the discreet delivery of malicious code, taking advantage of browsers with lower levels of monitoring like Firefox and Opera.
The situation became even more critical in corporate environments. The Zoom Stealer campaign directly targeted professionals and companies, allowing attackers to gather sensitive information from virtual meetings on platforms like Zoom, Microsoft Teams, and Google Meet.
Among the detected extensions were supposed productivity tools and video call utilities that were actually capable of capturing real-time data, such as meeting links, credentials, participant lists, and full details of online sessions. A clear reminder that in cybersecurity, what seems harmless isn't always safe.
Read more: How to Stay Safe from Cyberattacks in 2026: A Business Guide
The Three Modes of Attack
DarkSpectre’s operation was neither improvised nor generic. It relied on three well-defined strategies, tailored to the type of user, the browser, and the final objective. Each played a specific role within the attack, and together, they explain why this threat went undetected for so long.
ShadyPanda: Large-Scale Surveillance and Fraud
ShadyPanda was the most widespread campaign. It managed to affect 5.6 million users through more than 100 extensions that, for years, appeared completely harmless—tab managers, translators, or personalized homepages.
The key was patience. First, they built a solid user base, and only afterward did they activate the malicious functions via silent updates, without the user noticing anything unusual.
From that point on, the extensions began communicating with external servers, from which they could change their behavior at any moment. This allowed them to inject remote code to steal sensitive information, hijack search results, constantly track user activity, and replace legitimate links with fraudulent affiliate links, especially on e-commerce sites.
GhostPoster: Extreme Stealth and Hidden Code
The GhostPoster campaign took a more technical and discreet approach. It affected over one million users, primarily on Firefox and Opera—browsers that tend to have less monitoring than Chrome or Edge.
Its most striking technique was the use of steganography, hiding malicious JavaScript code inside PNG images. Upon installing the extension, the code would be extracted and executed without raising suspicion, enabling remote command execution and the download of new malicious payloads.
To make detection even harder, activation could be delayed up to 48 hours and only affected a small percentage of users. A clear example was a fake “Google Translate” extension for Opera that installed a hidden backdoor, disabled anti-fraud protections, and sent information to servers linked to other campaigns by the same group.
Zoom Stealer: Real-Time Corporate Espionage

The third and most concerning mode was Zoom Stealer, detected in late 2025. This campaign marked a clear shift toward corporate espionage, affecting 2.2 million users through at least 18 extensions distributed via Chrome, Edge, and Firefox.
The extensions posed as productivity tools for video calls but requested excessive permissions, with access to over 28 video conferencing platforms. Once installed, they began automatically collecting key information: meeting links, credentials, participant lists, names, job titles, photos, and other professional data.
All of this information was sent in real time to cloud databases through covert connections, using legitimate services as a front. The result was unauthorized access to confidential meetings and the creation of a high-value database of corporate and commercial intelligence—something especially dangerous for companies and executives.
Read more: Zoom Stealer: Browser Extensions Steal Meeting Data
What Can You Do Now to Protect Yourself?
Although this attack was especially sophisticated, not everything is out of your control. There are simple, concrete actions you can take that can make a big difference—whether you're an individual user or managing teams or a company.
-
Review your extensions and remove the ones you don’t use: Start with the basics. Go into your browser settings and check all installed extensions. If you don’t remember what one does or haven’t used it in a while, it’s best to delete it. Fewer extensions mean fewer risks.
-
Only install extensions from trusted sources (and with discernment): Even if they’re in official stores, don’t take anything for granted. Check ratings, recent reviews, requested permissions, and who the developer is. If it asks for more access than seems reasonable, that’s a red flag.
-
Keep your browser up to date at all times: Updates aren’t just for visual improvements. They include critical security patches that fix vulnerabilities exploited by attackers. Enabling automatic updates is one of the simplest ways to stay protected.
-
Strengthen your security with additional tools: A reliable cybersecurity solution can detect abnormal behavior even when software seems legitimate. This is especially important in work environments and on corporate devices.
-
Enable two-factor authentication on all your services: Two-step verification adds an extra layer of protection. Even if someone gets your credentials, gaining access becomes much harder without that second authentication factor.
Adopting these habits doesn’t eliminate risk entirely, but it greatly reduces the chances of falling victim to this kind of attack. At TecnetOne, we see it every day: when it comes to cybersecurity, prevention and awareness remain the best ways to protect yourself—both personally and professionally.

