Close Menu
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
X (Twitter) LinkedIn WhatsApp
Trending
  • Cybersecurity Weekly Report (April 06–12, 2026): Ransomware & Major Attacks
  • Cybersecurity Weekly Report: March 23 – 29, 2026
  • Data Breach Detection Time 2026: The Full Guide
  • Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode
  • Cybersecurity Weekly Report: 16 – 22 March, 2026
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
  • WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis
  • Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps
Monday, April 13
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
Cyber infos
Malware Analysis

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

V DiwaharBy V DiwaharJanuary 7, 2026Updated:March 24, 2026No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

Malicious Chrome Extensions Secretly Copy ChatGPT DeepSeek Chats of 900k Users. A sneaky web browser scheme has been caught by security experts.

This setup used fake Chrome add-ons to grab private talks from ChatGPT and DeepSeek. Information pulled wasn’t limited to chats – full surfing records were taken too. The digital theft affected over nine hundred thousand people across the globe. Most victims had no idea their data was being siphoned away.

Researchers at OX Security spotted the activity while checking browser add-ons. Notably disturbing – these fake tools looked just like real AI helpers people trust. Their realistic design helped them spread widely before anyone noticed they were harmful.

Table of Contents hide
1 Some Fake AI Tools Pretend To Be Safe
2 How Data Theft Happens
3 Why This Matters
4 Evasion and Persistence Methods
5 Signs of Security Breaches
6 Users and organizations actions
7 Final Thoughts

Some Fake AI Tools Pretend To Be Safe

A slick look fooled many – these fake add-ons copied AITOPIA AI’s sidebar, slipping into browsers to deliver instant access to ChatGPT, Claude, even DeepSeek. Though built to impress with promises of endless functions, they lured in students, coders, people using AI daily. Smooth design hid their true aim, one that wasn’t about help but something else entirely.

A pair of add-ons made it official during the push. These extras showed up when the effort kicked into gear

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

  • Chat GPT Chrome extension with GPT-5 Claude Sonnet and DeepSeek AI
  • Over 600,000 installs
  • Extension ID: fnmihdojmnkclgjpcoonokmkhjpjechg

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

  • AI Sidebar Featuring Deepseek ChatGPT Claude and Others
  • Over 300,000 installs
  • Extension ID: inhcgfpbfdjbjogdfjbclgolkmhnooop

Surprisingly, a badge labeled “Featured” by the Chrome Web Store once appeared on one of these add-ons, building confidence until its harmful actions came to light.

How Data Theft Happens

Right after setup, these add-ons use Chrome’s tabs.onUpdated feature to keep an eye on what pages are visited. A different ID gets tied to each compromised browser so hackers can link up data pulled across sessions.

When users access chatgpt.com or deepseek.com, the extensions:

  • Inspect page content directly within the browser
  • Grab the messages people typed, what the system answered back, along with unique codes tied to each chat instance
  • Keep the collected information right where it lands
  • Base64 encoding applied
  • Every half hour, pull out the data in timed chunks

Information taken without permission gets sent to servers run by hackers – ones like deepaichats[.]com and chatsaigpt[.]com. From there, it feeds into their network of control.

Not every tool plays fair. While real AI systems admit their backend tasks up front, some sneaky add-ons work behind your back. They stash full chat logs, grab hidden links, even track private site visits – none of which users see coming. Awareness? Not part of the deal.

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

Why This Matters

When people use AI tools, they often share data that’s deeply private. If chats get breached, secrets could slip out

  • Secret software blueprints sit alongside legally protected creations
  • Secret plans from inside companies. Money details stay hidden unless shared by staff
  • Information that tells who you are
  • Credentials API Keys Authentication Tokens

Browsing records collected fully let attackers map out who users are, spot company systems. These details open doors for focused scams that mimic real contacts. Firms face steep odds when private information slips out – spies might benefit, fines could follow. What seems like a minor log turns into evidence used elsewhere.

Evasion and Persistence Methods

By using different tricks, the attackers stayed under the radar longer. Their methods made detection harder. This helped keep their operation running without notice. Some techniques slowed down analysis by others. Others created delays in response efforts. Each step added time before discovery. Staying hidden became easier through small changes that built up. Fewer alarms meant more room to operate. The approach focused on patience instead of speed

  • Hidden behind Lovable.dev are hosting rules and system setups that mask who actually owns them
  • Asking people to agree to tracking by calling it anonymous data collection
  • A fresh threat shows up each time an old one gets removed. One bad add-on sends people straight to another. Removing one leads directly to facing a different harmful version. Each cleanup brings a new problem instead of relief. The cycle continues without real resolution
  • Fake designs that copy real logos and screens appear nearly identical at first glance

On January 7, 2026, people could still get both add-ons even though details had been shared publicly. The “Featured” label disappeared; however, signs showed updates happened as late as October 2025.

Signs of Security Breaches

Malicious Extensions

  • Chat GPT Chrome extension with GPT-5 Claude Sonnet and DeepSeek AI
  • ID: fnmihdojmnkclgjpcoonokmkhjpjechg
  • Version: 1.9.6
  • AI Sidebar Featuring Deepseek ChatGPT Claude and Others
  • ID: inhcgfpbfdjbjogdfjbclgolkmhnooop
  • Version: 1.6.1

Network Indicators

  • deepaichats[.]com – Primary exfiltration endpoint
  • chatsaigpt[.]com – Secondary command-and-control server
  • chataigpt[.]pro – Infrastructure and policy hosting
  • chatgptsidebar[.]pro – Redirect and persistence infrastructure

Users and organizations actions

  • Review installed Chrome extensions and remove the listed IDs immediately
  • Check past AI chats to see if private details were shared by accident
  • Switch out login details, API access codes, or digital passes if they’ve been seen by others
  • Restrict browser extension installation through enterprise policies
  • Choose add-ons made by familiar creators who clearly explain how they protect your data

Final Thoughts

What happened here reflects something bigger unfolding fast – hackers now see browser add-ons as prime targets, especially with AI weaving tightly into how people work each day.

With more people using AI, hackers find it tempting to sneak into chats. Watch closely

What happens inside your web browser matters now more than ever. Staying safe online means paying attention to add-ons you install. Ignoring their risks can lead to bigger problems down the road. Protection starts small, often where you least expect it.

Related posts:

  1. What Are Rootkits? A Simple Guide to Detecting and Removing Them in 2026
  2. What Are Zero-Day Attacks and How Can Protect Yourself
  3. Black Basta Ransomware: How the BRUTED Framework Exploits Edge Devices in 2025
  4. LinkedIn RAT Malware Campaign Exploits DLL Sideloading in 2026
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleLatest Alert: CVE-2025-68668 Exposes Critical n8n Security Flaw
Next Article Cybersecurity weekly report: January 4–10, 2026 – Breaches, Ransomware & Patches
V Diwahar
  • Website
  • LinkedIn

I'm Aspiring SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

Claude Artifacts ClickFix macOS Infostealer: Dangerous AI Malware Campaign

February 14, 2026
Read More

LinkedIn RAT Malware Campaign Exploits DLL Sideloading in 2026

January 21, 2026
Read More

New Year, New Threats: Emerging Malware Families to Watch in 2026

December 31, 2025
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber Attacks & Exploits

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026

AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts

February 25, 2026

Google Antigravity Suspension Hits OpenClaw Users

February 24, 2026
Top 10 Security Tools

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Cybersecurity Weekly Report (April 06–12, 2026): Ransomware & Major Attacks

April 13, 2026

Cybersecurity Weekly Report: March 23 – 29, 2026

March 30, 2026

Data Breach Detection Time 2026: The Full Guide

March 28, 2026

Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode

March 26, 2026

Cybersecurity Weekly Report: 16 – 22 March, 2026

March 22, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
Copyright © 2026 cyberinfos.in - All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.