HomeTechnologyMalicious browser extensions quietly hit Chrome, Firefox and Edge users in massive GhostPoster attack

Malicious browser extensions quietly hit Chrome, Firefox and Edge users in massive GhostPoster attack

A stealthy malware campaign called GhostPoster used fake browser extensions to infect Chrome, Firefox and Edge users, hiding malicious code inside image files and quietly stealing data and ad revenue for years.

January 19, 2026 / 13:13 IST
Story continues below Advertisement
Chrome
Chrome
Snapshot AI
  • GhostPoster malware hid in 17 browser extensions, downloaded over 840,000 times
  • Malicious code was concealed in PNG icons using steganography to evade detection
  • Users must manually uninstall infected extensions for full protection

A long-running and highly sophisticated malware campaign has been quietly targeting users of Google Chrome, Mozilla Firefox and Microsoft Edge, and chances are many people never noticed a thing. According to a report by GBhackers, at least 17 malicious browser extensions were involved in what security researchers have named the GhostPoster operation. Together, these extensions were downloaded more than 840,000 times, making this one of the most persistent and technically mature extension-based threats seen so far.

What makes GhostPoster especially worrying is how normal everything looked on the surface. The infected extensions were simple, everyday tools like screenshot grabbers, ad blockers, translation helpers, cursor customisers, and media downloaders. These are exactly the kind of add-ons people install without thinking twice. Behind the scenes, however, these extensions were hiding malware in a very clever way.

Story continues below Advertisement

Instead of placing malicious code where scanners would usually look, the attackers hid it inside PNG image files, specifically the extension’s icon. This technique, known as steganography, allowed the malware to slip past security checks used by browser extension stores. To a human reviewer or an automated system, the icon looked like a regular image. But to the extension itself, it was a container full of hidden data.

Even after installation, GhostPoster didn’t rush into action. The malware was designed to wait quietly for at least 48 hours, and in some advanced versions, nearly five days. During this time, the extension behaved normally, helping it avoid systems that watch for suspicious activity right after installation. Once the waiting period ended, the malware contacted remote servers and downloaded additional malicious code.