Contributors: Dar Kahlon

As generative AI tools like ChatGPT, Claude, Gemini, and Grok become part of everyday workflows, attackers are increasingly exploiting their popularity to distribute malicious browser extensions.

In this research, we uncovered a coordinated campaign of Chrome extensions posing as AI assistants for summarization, chat, writing, and Gmail assistance. While these tools appear legitimate on the surface, they hide a dangerous architecture: instead of implementing core functionality locally, they embed remote, server-controlled interfaces inside extension-controlled surfaces and act as privileged proxies, granting remote infrastructure access to sensitive browser capabilities.

Across 30 different Chrome extensions, published under different names and extension IDs and affecting over 260,000 users, we observed the same underlying codebase, permissions, and backend infrastructure.

Critically, because a significant portion of each extension’s functionality is delivered through remotely hosted components, their runtime behavior is determined by external server-side changes, rather than by code reviewed at install time in the Chrome Web Store.

Campaign Structure and Impact

The campaign consists of multiple Chrome extensions that appear independent, each with different names, branding, and extension IDs. In reality, all identified extensions share the same internal structure, JavaScript logic, permissions, and backend infrastructure.

Across 30 extensions impacting more than 260,000 users, the activity represents a single coordinated operation rather than separate tools. Notably, several of the extensions in this campaign were Featured by the Chrome Web Store, increasing their perceived legitimacy and exposure.

This technique commonly known as extension spraying, is used to evade takedowns and reputation-based defenses. When one extension is removed, others remain available or are quickly re-published under new identities. Although the extensions impersonate different AI assistants (Claude, ChatGPT, Gemini, Grok, and generic “AI Gmail” tools), they all serve as entry points into the same backend-controlled system.

Technical Overview

In this report we will analyze the AI Assistant (nlhpidbjmmffhoogcennoiopekbiglbp) extension.

Figure 1. Featured “Claude” Assistant

Remote Iframe as the Core UI

The extension renders a full-screen iframe pointing to a remote domain (claude.tapnetic.pro). This iframe overlays the current webpage and visually appears as the extension’s interface.


Figure 2. IFrame Injection

Because the iframe loads remote content:

  • The operator can change UI and logic at any time
  • No Chrome Web Store update is required
  • New capabilities can be introduced silently

Page Content Extraction

When instructed by the iframe, the extension queries the active tab and invokes a content script that extracts readable article content using Mozilla’s Readability library. The extracted data includes titles, text content, excerpts, and site metadata.

Figure 3. Page Content Extraction

This information is then sent back to the remote iframe, meaning that a third-party server can receive structured representations of any page the user is viewing, including sensitive internal or authenticated pages.

Voice Recognition Capability

The extension also supports message-triggered voice recognition using the Web Speech API. Upon request from the iframe, speech recognition is started and the resulting transcript is returned to the remote page.

While browser permissions may limit abuse in some cases, the presence of this capability demonstrates the broad scope of access granted to the remote controller.

Telemetry Collection

The extension package includes explicit tracking pixel scripts that send install and uninstall events to a third-party analytics endpoint.

These mechanisms are commonly associated with:

  • Attribution tracking
  • Monetization funnels
  • Retention analysis

Gmail Integration Cluster

A subset of the campaign, comprising 15 extensions, explicitly targets Gmail. Despite being published under different names and branding, and marketed as offering distinct capabilities not always related to email assistance, all of these extensions share an identical Gmail integration codebase.

Each includes a dedicated Gmail-only content script that runs at document_start on mail.google.com, separate from the generic <all_urls> content script. This module injects extension-controlled UI elements into Gmail and maintains persistence using MutationObserver and periodic polling.

The Gmail integration reads visible email content directly from the DOM, repeatedly extracting message text via .textContent from Gmail’s conversation view. 


Figure 4. Gmail Content Reading

This includes email thread content and, depending on state, draft or compose-related text.

When Gmail-related features such as AI-assisted replies or summaries are invoked, the extracted email content is passed into the extension’s logic and transmitted to third-party backend infrastructure controlled by the extension operator. As a result, email message text and related contextual data may be sent off-device, outside of Gmail’s security boundary, to remote servers.

C&C -Infrastructure and Threat Attribution

tapnetic[.]pro C&C Domain Characteristics

All analyzed extensions communicate with infrastructure under the tapnetic[.]pro domain. While the domain hosts a publicly accessible website that appears legitimate at first glance, our analysis found that:

  • The website presents generic marketing-style content
  • No features, downloads, or user actions are actually functional
  • No clear product, service, or ownership information is provided

At the time of analysis, the site appeared to function primarily as cover infrastructure, lending legitimacy to the domain while the real activity occurs through extension-controlled subdomains.

Figure 5. Tapnetic.pro

Subdomain Segmentation

Each extension communicates with a dedicated subdomain of tapnetic[.]pro, typically themed to match the impersonated AI product (e.g., Claude, ChatGPT, Gemini).

Figure 6. Tapnetic.pro subdomains – VirusTotal.com

This design provides several advantages to the operator:

  • Logical separation between extensions
  • Reduced blast radius if a single subdomain is blocked
  • Easier rotation or replacement of individual extension backends

Despite different subdomains, request structure, parameters, and server behavior are consistent across the campaign, indicating a single backend system.

Extension Lifecycle Abuse and Re-Upload Evasion

We also observed active evasion of Chrome Web Store enforcement.

One extension in the campaign, fppbiomdkfbhgjjdmojlogeceejinadg, was removed from the Chrome Web Store on February 6, 2025.

Less than two weeks later, an identical extension was published under a new ID and name:

  • New extension ID: gghdfkafnhfpaooiolhncejnlgglhkhe
  • Upload date: February 20, 2025

The re-uploaded extension is a full copy of the removed one:

  • Identical JavaScript logic
  • Same permissions
  • Same iframe-based architecture
  • Same tapnetic.pro infrastructure

This behavior is consistent with extension spraying tactics, allowing operators to quickly restore distribution after takedowns while maintaining the same backend control.

Conclusion

By leveraging the trust users place in well-known AI names such as Claude, ChatGPT, Gemini, and Grok, attackers are able to distribute extensions that fundamentally break the browser security model.

The use of full-screen remote iframes combined with privileged API bridges transforms these extensions into general-purpose access brokers, capable of harvesting data, monitoring user behavior, and evolving silently over time. While framed as productivity tools, their architecture is incompatible with reasonable expectations of privacy and transparency.

As generative AI continues to gain popularity, defenders should expect similar campaigns to proliferate. Extensions that delegate core functionality to remote, mutable infrastructure should be treated not as convenience tools, but as potential surveillance platforms.

Indicators of Compromise (IOCs)

Extensions

ID Name Installs
nlhpidbjmmffhoogcennoiopekbiglbp

AI Assistant

50,000
gcfianbpjcfkafpiadmheejkokcmdkjl

Llama

147
fppbiomdkfbhgjjdmojlogeceejinadg

Gemini AI Sidebar

80,000
djhjckkfgancelbmgcamjimgphaphjdl

AI Sidebar

9,000
llojfncgbabajmdglnkbhmiebiinohek

ChatGPT Sidebar

10,000
gghdfkafnhfpaooiolhncejnlgglhkhe

AI Sidebar

50,000
cgmmcoandmabammnhfnjcakdeejbfimn

Grok

261
phiphcloddhmndjbdedgfbglhpkjcffh

Asking Chat Gpt

396
pgfibniplgcnccdnkhblpmmlfodijppg

ChatGBT

1,000
nkgbfengofophpmonladgaldioelckbe

Chat Bot GPT

426
gcdfailafdfjbailcdcbjmeginhncjkb

Grok Chatbot

225
ebmmjmakencgmgoijdfnbailknaaiffh

Chat With Gemini

760
baonbjckakcpgliaafcodddkoednpjgf

XAI

138
fdlagfnfaheppaigholhoojabfaapnhb

Google Gemini

7,000
gnaekhndaddbimfllbgmecjijbbfpabc

Ask Gemini

1,000
hgnjolbjpjmhepcbjgeeallnamkjnfgi AI Letter Generator 129
lodlcpnbppgipaimgbjgniokjcnpiiad AI Message Generator 24
cmpmhhjahlioglkleiofbjodhhiejhei AI Translator 194
bilfflcophfehljhpnklmcelkoiffapb AI For Translation 91
cicjlpmjmimeoempffghfglndokjihhn AI Cover Letter Generator 27
ckneindgfbjnbbiggcmnjeofelhflhaj AI Image Generator Chat GPT 249
dbclhjpifdfkofnmjfpheiondafpkoed Ai Wallpaper Generator 289
ecikmpoikkcelnakpgaeplcjoickgacj Ai Picture Generator 813
kepibgehhljlecgaeihhnmibnmikbnga DeepSeek Download 275
ckicoadchmmndbakbokhapncehanaeni AI Email Writer 64
fnjinbdmidgjkpmlihcginjipjaoapol Email Generator AI 881
gohgeedemmaohocbaccllpkabadoogpl DeepSeek Chat 1,000
flnecpdpbhdblkpnegekobahlijbmfok ChatGPT Picture Generator 251
acaeafediijmccnjlokgcdiojiljfpbe ChatGPT Translate 30,000
kblengdlefjpjkekanpoidgoghdngdgl AI GPT 20,000
idhknpoceajhnjokpnbicildeoligdgh ChatGPT Translation 1,000
fpmkabpaklbhbhegegapfkenkmpipick Chat GPT for Gmail 1,000

Domains

Tapnetic[.]pro

onlineapp[.]pro

Emails

  • tapnetic307@gmail.com
  • tapnetic.space@gmail.com
  • airtronics307@gmail.com
  • convertheic2jpg@gmail.com
  • airnetic.space@gmail.com
  • ai.technetic@gmail.com
  • fontfindertool1@gmail.com
  • hockwatson@gmail.com
  • samgoogins2@gmail.com
  • imageconvertertool@gmail.com
  • softnetica.space@gmail.com
  • chatbotgpttool@gmail.com
  • jamesjamesliam123890@gmail.com
  • giftopngconverter@gmail.com
  • jackovichjack258@gmail.com
  • ailettergenerator@gmail.com
  • aitoolsikonnikov@gmail.com
  • jamesjamesliam123890@gmail.com
  • tedlasso693@gmail.com
  • hartbob242@gmail.com
  • aliceking0400@gmail.com
  • kickshot03@gmail.com
  • johnrick7667@gmail.com
  • jackyjames854@gmail.com
  • redactpdf@gmail.com
  • deli789ch@gmail.com
  • jimmy.green568@gmail.com
  • serhongyvtg@gmail.com
  • maxxfreeman606@gmail.com

Tactics, Techniques, and Procedures (TTPs)

Tactic Technique
Resource Development LX2.003(T1583) – Acquire Infrastructure
Initial Access LX3.004 (T1189) – Drive-by Compromise
Initial Access LX3.003 (T1199) – Trusted Relationship
Execution LX4.003 – Script Execution
Defense Evasion LX7.011 (T1036) – Masquerading
Credential Access LX8.007(T1557) – Adversary-in-the-Middle
Collection LX10.012 – Web Communication Data Collection
Collection LX10.005 – Collect User’s Information
Command and Control LX11.004 – Establish Network Connection
Command and Control LX11.005 – Web Service-Based C2
Exfiltration LX12.001 – Data Exfiltration

Recommendations

Security professionals, enterprise defenders, and browser developers should take the following actions:

  • Audit extensions within managed environments, especially those installed outside of policy controls.
  • Deploy behavior-based extension monitoring technologies to detect unauthorized network activity or suspicious DOM manipulation.
  • Strengthen runtime monitoring and enforcement, not just install-time review, to detect post-installation behavior changes driven by backend infrastructure.