Moneycontrol PRO
Loans
Loans
HomeTechnologyMalicious browser extensions quietly hit Chrome, Firefox and Edge users in massive GhostPoster attack

Malicious browser extensions quietly hit Chrome, Firefox and Edge users in massive GhostPoster attack

A stealthy malware campaign called GhostPoster used fake browser extensions to infect Chrome, Firefox and Edge users, hiding malicious code inside image files and quietly stealing data and ad revenue for years.

January 19, 2026 / 13:13 IST
Chrome
Snapshot AI
  • GhostPoster malware hid in 17 browser extensions, downloaded over 840,000 times
  • Malicious code was concealed in PNG icons using steganography to evade detection
  • Users must manually uninstall infected extensions for full protection

A long-running and highly sophisticated malware campaign has been quietly targeting users of Google Chrome, Mozilla Firefox and Microsoft Edge, and chances are many people never noticed a thing. According to a report by GBhackers, at least 17 malicious browser extensions were involved in what security researchers have named the GhostPoster operation. Together, these extensions were downloaded more than 840,000 times, making this one of the most persistent and technically mature extension-based threats seen so far.

What makes GhostPoster especially worrying is how normal everything looked on the surface. The infected extensions were simple, everyday tools like screenshot grabbers, ad blockers, translation helpers, cursor customisers, and media downloaders. These are exactly the kind of add-ons people install without thinking twice. Behind the scenes, however, these extensions were hiding malware in a very clever way.

Instead of placing malicious code where scanners would usually look, the attackers hid it inside PNG image files, specifically the extension’s icon. This technique, known as steganography, allowed the malware to slip past security checks used by browser extension stores. To a human reviewer or an automated system, the icon looked like a regular image. But to the extension itself, it was a container full of hidden data.

Even after installation, GhostPoster didn’t rush into action. The malware was designed to wait quietly for at least 48 hours, and in some advanced versions, nearly five days. During this time, the extension behaved normally, helping it avoid systems that watch for suspicious activity right after installation. Once the waiting period ended, the malware contacted remote servers and downloaded additional malicious code.

This setup gave attackers a lot of flexibility. They could change what the malware did without updating the extension itself, making it harder for security teams to shut the operation down completely. By the time anything suspicious showed up, the extension had already earned the browser’s trust.

So what was GhostPoster actually doing? Most signs point to money. The malware could weaken website security protections, redirect affiliate links to steal commissions, inject scripts for click fraud, and track users across browsing sessions. It even had the ability to bypass CAPTCHA systems, which are meant to stop automated abuse.

Researchers believe the campaign may have started on Edge as early as 2020, before spreading to Firefox and Chrome. That means it managed to evade detection across major browser stores for almost five years, raising serious questions about how extensions are reviewed.

While Mozilla and Microsoft have removed confirmed malicious extensions from their stores, there’s a catch. If the extension is already installed on your system, it will keep working unless you remove it yourself.

The takeaway is simple: take a few minutes to check your browser extensions. If you don’t recognise one or no longer use it, uninstall it. GhostPoster is a reminder that even the smallest tools in your browser can become a serious security risk if left unchecked.

Invite your friends and family to sign up for MC Tech 3, our daily newsletter that breaks down the biggest tech and startup stories of the day

Ankita Chakravarti
Ankita Chakravarti is a seasoned journalist with nearly a decade of experience in media. She specializes in technology and lifestyle journalism. She has worked with top Indian media houses like India Today, Zee News, The Statesman, and Millennium Post. Her expertise spans tech trends, phone launches, gadget reviews, and entertainment news. Ankita holds a Master's in Journalism and Mass Communication along with a degree in English Literature. She can be reached out at ankita.chakravarti@nw18.com
first published: Jan 19, 2026 01:13 pm

Discover the latest Business News, Sensex, and Nifty updates. Obtain Personal Finance insights, tax queries, and expert opinions on Moneycontrol or download the Moneycontrol App to stay updated!

Subscribe to Tech Newsletters

  • On Saturdays

    Find the best of Al News in one place, specially curated for you every weekend.

  • Daily-Weekdays

    Stay on top of the latest tech trends and biggest startup news.

Advisory Alert: It has come to our attention that certain individuals are representing themselves as affiliates of Moneycontrol and soliciting funds on the false promise of assured returns on their investments. We wish to reiterate that Moneycontrol does not solicit funds from investors and neither does it promise any assured returns. In case you are approached by anyone making such claims, please write to us at grievanceofficer@nw18.com or call on 02268882347