Discover expert insights, industry trends, and practical tips to optimize your IT infrastructure and boost business efficiency with our comprehensive blog.
Massive Browser Hijacking Campaign Targets 2.3 Million Users Through Malicious Chrome and Edge Extensions
RedDirection Attack Exploits Chrome and Edge Extension Trust to Steal User Data – Massive Browser Hijacking Campaign Compromises 2.3 Million Users Through Trusted Extensions
Massive Browser Hijacking Campaign Targets 2.3 Million Users Through Malicious Chrome and Edge Extensions
The cybersecurity community has uncovered one of the most sophisticated browser hijacking campaigns to date, with over 2.3 million users across Google Chrome and Microsoft Edge falling victim to 18 malicious extensions. This widespread attack, dubbed the “RedDirection campaign,” demonstrates how cybercriminals are exploiting the trust users place in official browser marketplaces to conduct large-scale surveillance and data theft operations.
Description of the RedDirection Campaign
The RedDirection campaign represents a coordinated effort by threat actors to infiltrate browsers through seemingly legitimate extensions available on both the Chrome Web Store and Microsoft Edge Add-ons marketplace. Researchers at Koi Security first discovered this sophisticated operation while investigating a single extension called “Color Picker, Eyedropper — Geco colorpick,” which led to the identification of 17 additional malicious extensions operating under the same infrastructure. What makes this campaign particularly insidious is its patient, long-term approach – these extensions functioned as legitimate productivity tools for months or even years before activating their malicious capabilities through automatic updates.
Extensions masqueraded as everyday productivity tools offering functionality such as color picking, emoji keyboards, weather forecasts, VPN services, volume boosters, and video speed controllers
Many extensions carried verified badges, featured placement on official stores, and maintained hundreds of positive reviews
Extensions initially functioned exactly as advertised, providing promised functionality while secretly monitoring user activity
Malicious code was introduced through subsequent updates, sometimes years after original installation
Attack bypassed user awareness and security scrutiny through automatic update mechanisms
The sophisticated nature of this campaign demonstrates how cybercriminals have evolved to exploit user trust in official marketplaces and the automatic update systems that users rely on for convenience.
Severity of the Issue
The RedDirection campaign represents a critical threat to user privacy and security with implications that extend far beyond typical malware infections. The scale of this operation is unprecedented, affecting over 2.3 million users across both Chrome and Edge browsers, making it one of the largest browser hijacking operations ever documented. The campaign’s duration and sophistication are equally concerning, with some extensions operating as “sleeper agents” since at least July 2024, demonstrating the attackers’ patience and long-term strategic planning.
Over 2.3 million affected users across both Chrome and Edge browsers
Created one of the largest browser hijacking operations documented to date
Campaign spans multiple years with some extensions operating as sleeper agents since at least July 2024
Extensions had access to extensive browser permissions allowing monitoring of every website visit
Coordinated attack involving 18 different extensions connected to single command-and-control infrastructure
Demonstrated sophisticated planning and significant resources behind the operation
The severity is amplified by the trust users placed in these verified extensions and the potential for ongoing surveillance without user knowledge or consent.
How the Attack is Exploited
The RedDirection campaign employs a sophisticated multi-stage attack methodology that operates entirely without user interaction or awareness. The exploitation process begins with legitimate extensions that provide actual functionality to users, building trust and avoiding suspicion during the initial installation period. These extensions remain dormant until receiving updates that introduce malicious code through the automatic update mechanism that both Chrome and Edge use to keep extensions current. This approach bypasses both user scrutiny and many security detection systems, as the malicious functionality only appears after the extension has established itself as a trusted component of the user’s browser environment.
Background service workers register listeners triggered whenever users navigate to new webpages
Listeners capture URLs of visited pages and transmit information to remote servers with unique tracking identifiers
Command-and-control servers respond with redirection URLs, hijacking browsing sessions
Extensions use Chrome Extensions API to intercept web requests and modify browser behavior
Attack chain includes ability to serve fake software updates, particularly targeting Zoom users
Extensions can redirect users to phishing sites designed to steal login credentials
The exploitation process operates entirely in the background, making detection extremely difficult for average users who continue to receive the advertised functionality while being monitored.
Who is Behind the Attack
Security researchers have identified several characteristics that point to an organized cybercriminal operation rather than individual hackers behind the RedDirection campaign. The threat actors demonstrate sophisticated technical capabilities and employ long-term planning approaches that suggest significant resources and expertise in browser-based attacks. The level of coordination required to manage 18 different extensions, each with its own command-and-control subdomain designed to mask their connection to a centralized infrastructure, indicates a well-organized group with experience in large-scale operations.
Organized cybercriminal operation rather than individual hackers
Sophisticated technical capabilities and long-term planning approach
Well-resourced group with experience in large-scale operations
Each extension connected to own command-and-control subdomain to mask centralized infrastructure
Threat actors likely acquired access through developer account compromises rather than direct code exploitation
Group demonstrates capabilities in social engineering, phishing, or other methods to gain unauthorized access
The professional nature of the operation, combined with its scale and duration, suggests this group has significant resources and likely operates as part of a larger cybercriminal ecosystem focused on data theft and advertising fraud.
Who is at Risk
The RedDirection campaign specifically targets users of Google Chrome and Microsoft Edge browsers, which collectively represent the vast majority of internet users worldwide. However, the risk profile varies significantly across different user groups based on their browsing habits and organizational security policies. Small and medium-sized businesses face particularly elevated risk, as their employees often install browser extensions to enhance productivity without proper security oversight or approval processes. The extensions in this campaign specifically targeted productivity tools, making them especially appealing to business users seeking to improve their workflow efficiency and daily productivity.
Small and medium-sized businesses whose employees install productivity extensions without security oversight
Individual users who frequently install browser extensions for enhanced functionality
Users who visit sensitive websites including online banking, corporate portals, and cloud services
Business users seeking workflow efficiency improvements through browser extensions
Anyone using Google Chrome or Microsoft Edge browsers with installed extensions
The broad appeal of productivity-focused extensions makes virtually any internet user a potential target for this type of attack.
Remediation and Protection Measures
Protecting against browser extension-based attacks requires a comprehensive approach that addresses both immediate threats and long-term security posture. The remediation process must begin with immediate action to remove any potentially compromised extensions and eliminate traces of malicious activity, followed by implementing robust preventive measures to avoid future incidents. Organizations and individuals need to fundamentally reassess their approach to browser extension management, moving from a permissive model to one based on careful evaluation and ongoing monitoring.
Uninstall all identified malicious extensions from browsers immediately
Check installed extensions against known malicious extension lists
Clear all browser data including browsing history, cookies, cached files, and site data
Conduct full system malware scans to detect additional malicious software
Monitor online accounts for suspicious activity, particularly sensitive services
Implement browser extension allowlists restricting installation to approved extensions only
Provide regular security awareness training emphasizing browser extension risks
Encourage installation only from verified developers and regular review of installed extensions
Users should check for the following add-ons in Chrome browser and remove them as soon as possible:
Color Picker, Eyedropper — Geco colorpick
Emoji keyboard online — copy&paste your emoji
Free Weather Forecast
Video Speed Controller — Video manager
Unlock Discord — VPN Proxy to Unblock Discord Anywhere
Dark Theme — Dark Reader for Chrome
Volume Max — Ultimate Sound Booster
Unblock TikTok — Seamless Access with One-Click Proxy
Unlock YouTube VPN
Unlock TikTok
Weather
Organizations should establish formal policies governing browser extension installation and management to prevent future incidents and maintain a secure browsing environment.
How CinchOps Can Help
CinchOps understands the evolving nature of cyber threats and provides comprehensive protection against sophisticated attacks like the RedDirection campaign that target the fundamental tools businesses rely on daily. Our cybersecurity solutions are specifically designed to address both immediate risks and long-term security posture requirements, ensuring that your organization remains protected while maintaining the productivity and functionality essential for business operations. We recognize that browser extensions have become integral to modern business workflows, and our approach balances security with usability to provide effective protection without hindering legitimate business activities.
Continuous monitoring and threat detection capabilities identifying suspicious browser activity and extension-based attacks
Advanced endpoint protection solutions monitoring browser behavior and detecting malicious extensions before system compromise
Regular security assessments identifying vulnerabilities in browser security policies with appropriate control recommendations
Comprehensive employee security training programs educating workforce about browser extension risks and cyber threats
Browser management policy implementation including extension allowlists and security controls preventing unauthorized installations
Ongoing security monitoring detecting and preventing future browser infrastructure attacks
With CinchOps as your cybersecurity partner, your organization receives protection against the latest threats while maintaining the productivity and functionality your business requires to succeed in today’s digital environment.