DarkSpectre Malware Infected 8.8 Million Browser Users
Chinese threat actor behind coordinated extension campaigns spanning seven years. Zoom Stealer component harvested corporate meeting credentials from 28 platforms.
Security researchers have exposed DarkSpectre, a Chinese threat operation that infected over 8.8 million users across Chrome, Edge, and Firefox through malicious browser extensions. The campaign ran for seven years before detection, making it one of the longest-running browser-based espionage operations ever documented.
The discovery by Koi Security reveals three distinct campaigns operating under the DarkSpectre umbrella: ShadyPanda affecting 5.6 million users, Zoom Stealer targeting 2.2 million, and GhostPoster impacting 1.05 million. Each campaign employed different tactics but shared infrastructure and operational patterns pointing to a single well-resourced actor.
How DarkSpectre Evaded Detection
The group's primary technique involves "time-bomb" extensions—malicious code that remains completely dormant for days after installation before activating. One extension called "New Tab – Customized Dashboard" waited three full days post-install before connecting to command-and-control servers.
Even after activation, the malware only triggered on roughly 10% of page loads. This sampling approach made the malicious behavior exponentially harder to catch during security testing, where analysts typically observe extensions for limited periods.
The extensions built legitimate reputations over years. High user ratings, positive reviews, and clean update histories gave them the appearance of trustworthy software. Chrome Web Store's review process, designed to catch obvious malware, struggled with code that exhibited no malicious behavior during the evaluation window.
Zoom Stealer: Corporate Espionage at Scale
The most concerning component targets corporate video conferencing. Extensions masquerading as productivity tools and video downloaders secretly harvested meeting links, credentials, and speaker profiles from 28 different platforms including Zoom, Microsoft Teams, Google Meet, and Webex.
This isn't random data collection. Meeting links and participant information enable targeted attacks against specific organizations. An attacker with access to recurring meeting URLs can join calls uninvited, impersonate participants, or identify high-value targets based on meeting attendance patterns.
The 2.2 million affected users represent a mix of individual professionals and enterprise environments where browser extensions often escape IT security review. Unlike the Trust Wallet extension compromise that targeted cryptocurrency users, Zoom Stealer casts a wider net across industries.
Attribution to China
Multiple indicators point to Chinese state-sponsored or state-adjacent activity:
- Infrastructure hosted primarily on Alibaba Cloud
- ICP registrations tracing to Hubei Province
- Chinese language comments embedded in source code
- Campaign operations aligned with Chinese time zones
- ShadyPanda fraud schemes specifically targeting JD.com and Taobao
The targeting profile—corporate meeting data from Western companies—aligns with known Chinese intelligence priorities around technology transfer and competitive intelligence. Whether DarkSpectre operates under direct state control or functions as a contractor remains unclear.
GhostPoster's Steganography Twist
The GhostPoster campaign took a different approach, spreading through Firefox and Opera extensions that concealed malicious payloads inside PNG images using steganography. After lying dormant for several days, the extensions extracted and executed JavaScript hidden within the image files.
This technique complicates both automated detection and manual analysis. Security tools scanning for malicious JavaScript won't flag what appears to be a static image file. Analysts must specifically look for steganographic embedding—a time-consuming process when reviewing thousands of extensions.
The Dormant Threat
Koi Security's assessment carries a warning: "DarkSpectre likely has more infrastructure in place right now—extensions that look completely legitimate because they are legitimate, for now. They're still in the trust-building phase, accumulating users, earning badges, waiting."
The seven-year operational timeline suggests patience. Extensions may operate cleanly for months or years before receiving the payload that transforms them into malware. Any extension installed before researchers identified DarkSpectre's patterns could already be compromised.
The campaign also highlights structural problems with browser extension marketplaces. Chrome, Firefox, and Edge all struggle to detect malware that behaves legitimately during review periods. The Urban VPN extension incident demonstrated similar evasion, though on a smaller scale.
What Organizations Should Do
- Audit installed extensions across managed devices—look for unfamiliar productivity tools and video downloaders
- Implement extension allowlists rather than relying on marketplace reviews
- Monitor for unusual network traffic from browser processes, particularly to Alibaba Cloud IP ranges
- Review meeting platform access logs for sessions joined from unexpected locations
- Consider browser isolation for users handling sensitive meeting content
The 8.8 million figure represents known infections from identified campaigns. The actual scope could be larger if additional DarkSpectre extensions remain undetected. Organizations with employees in the affected user base should treat meeting credentials as potentially compromised and rotate accordingly.
Why This Matters
Browser extensions occupy a privileged position—they can read page content, intercept form submissions, and monitor user activity across every site visited. The marketplace model that makes extensions easy to install also makes them difficult to secure.
DarkSpectre's success demonstrates that nation-state actors have recognized this attack surface. The combination of legitimate appearance, long dwell times, and targeted data collection reflects operational sophistication that most enterprise security programs aren't equipped to detect.
For security teams already stretched thin, browser extensions represent yet another vector requiring active management. The alternative—waiting for researchers to discover the next DarkSpectre—means accepting unknown exposure across the user base.
Related Articles
GhostPoster Malware Hides in Firefox Extension Logos, Infects 50,000 Users
Security researchers uncover sophisticated steganography attack concealing malicious JavaScript within PNG logo files of 17 Firefox browser extensions.
Dec 17, 2025CrazyHunter Ransomware Hits Taiwan Healthcare Sector
A new ransomware group has compromised at least six healthcare organizations in Taiwan using BYOVD attacks to disable security software before encryption.
Jan 10, 2026Fog Ransomware Targets US Schools Through Stolen VPNs
A ransomware operation has compromised multiple US educational institutions using stolen VPN credentials. The education sector represents 80% of known victims.
Jan 10, 2026Chrome Extensions Stealing ChatGPT Chats Hit 900K Users
Two rogue browser extensions masquerading as AI tools exfiltrated complete conversation histories from ChatGPT and DeepSeek to attacker-controlled servers every 30 minutes.
Jan 9, 2026