Chrome Extensions: Are you getting more than you bargained for?

This analysis reveals the hidden dangers of certain Chrome extensions available on the Google Chrome Web Store. Despite the store's vetting process, some malicious extensions have slipped through, compromising user security. The study examines four examples of extensions with combined user bases exceeding 100,000, showcasing various security risks. These include undisclosed clipboard access to remote domains, data exfiltration, remote code execution capabilities, search hijacking, and cross-site scripting vulnerabilities. The extensions employ tactics such as command-and-control infrastructure with domain generation algorithms, user tracking, and brand impersonation. The research emphasizes the importance of caution when installing browser extensions, even from trusted sources, and recommends immediate uninstallation of the identified malicious extensions.

Pulse ID: 69778aef872cffc134e67ace
Pulse Link: https://otx.alienvault.com/pulse/69778aef872cffc134e67ace
Pulse Author: AlienVault
Created: 2026-01-26 15:40:31

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #Chrome #ChromeExtension #Clipboard #CyberSecurity #Google #ICS #InfoSec #OTX #OpenThreatExchange #RAT #RCE #RemoteCodeExecution #Rust #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Malware MoonPeak Executed via LNK Files

In January 2026, IIJ observed malicious LNK files targeting Korean users to execute the MoonPeak malware, attributed to North Korean threat actors. The infection chain begins with a LNK file that runs an obfuscated PowerShell script, which checks for analysis environments, creates additional scripts, and sets up persistence. The second stage downloads and executes a payload from GitHub, which is actually the MoonPeak malware. MoonPeak is obfuscated using ConfuserEx and communicates with a C2 server. The campaign utilizes GitHub for hosting malware, a technique known as Living Off Trusted Sites (LOTS). This attack demonstrates the ongoing threat posed by North Korean actors targeting various countries and individuals worldwide.

Pulse ID: 69777a203745e70e7425106f
Pulse Link: https://otx.alienvault.com/pulse/69777a203745e70e7425106f
Pulse Author: AlienVault
Created: 2026-01-26 14:28:48

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #GitHub #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #PowerShell #RAT #Rust #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Veloroute 1: #Radverkehr bekommt Vorfahrt im Nebennetz, Parkdruck bleibt zentrales Thema. Verbindung vom Burgwall bis zur Mallinckrodtstraße rückt näher. #Dortmund #Nordstadt #Politik #Rat #Stadtentwicklung #Verkehr #Mobilität
https://www.nordstadtblogger.de/veloroute-1-radverkehr-bekommt-vorfahrt-im-nebennetz-parkdruck-bleibt-zentrales-thema/
Veloroute 1: Radverkehr bekommt Vorfahrt im Nebennetz, Parkdruck bleibt zentrales Thema - Nordstadtblogger

In der Nordstadt wird die Veloroute 1 konkreter: In der Bezirksvertretung Innenstadt-Nord stellte die Verwaltung die Planung für die Teilstücke 1A und 1B vor – und machte deutlich, dass die Stadt noch 2026 bauen will. …

Nordstadtblogger
Goethe-Gymnasium bekommt langfristig mehr Klassenräume am Entenpoth-Standort. Verwaltungsvorstand sichert die Nutzung des Teilstandorts bis 2035. #Dortmund #Bildung #Politik #Rat #Stadtplanung
https://www.nordstadtblogger.de/goethe-gymnasium-bekommt-langfristig-mehr-klassenraeume-am-entenpoth-standort/
Goethe-Gymnasium bekommt langfristig mehr Klassenräume am Entenpoth-Standort - Nordstadtblogger

Planungssicherheit für das Goethe-Gymnasium: Die Schülerinnen und Schüler sollen langfristig zusätzliche Räume am Standort Entenpoth 34, der ehemaligen Frenzelschule, nutzen können. Der Verwaltungsvorstand hat sich dafür ausgesprochen, diesen Teilstandort bis zum 31. Juli 2035 weiter …

Nordstadtblogger

A $6,000 Russian Malware Toolkit with Chrome Web Store Guarantee

A new malware-as-a-service toolkit called 'Stanley' is being sold on Russian cybercrime forums for $2,000 to $6,000. It provides a turnkey website-spoofing operation disguised as a Chrome extension, with the premium tier promising guaranteed publication on the Chrome Web Store. The toolkit allows full-page website spoofing, element injection, push notifications, and backup domain rotation. It uses victims' IP addresses for tracking and implements a persistent polling mechanism to communicate with the command and control server. The malware's core attack involves website spoofing via iframe overlay, allowing attackers to harvest credentials while displaying legitimate URLs in the browser's address bar.

Pulse ID: 69772b44fe2e1c30ec984e32
Pulse Link: https://otx.alienvault.com/pulse/69772b44fe2e1c30ec984e32
Pulse Author: AlienVault
Created: 2026-01-26 08:52:20

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #Chrome #ChromeExtension #CyberCrime #CyberSecurity #InfoSec #Malware #MalwareAsAService #OTX #OpenThreatExchange #RAT #Russia #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Sandworm behind cyberattack on Poland's power grid in late 2025

Pulse ID: 6976fb12433099e6fae6af59
Pulse Link: https://otx.alienvault.com/pulse/6976fb12433099e6fae6af59
Pulse Author: Tr1sa111
Created: 2026-01-26 05:26:42

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberAttack #CyberSecurity #InfoSec #OTX #OpenThreatExchange #Poland #RAT #Sandworm #Worm #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

AI-Generated Malware Targets Blockchain Sector

The threat group Konni is targeting blockchain developers and engineers
using AI generated malware delivered through social engineering.

Pulse ID: 697556980d7cb28d19682fd8
Pulse Link: https://otx.alienvault.com/pulse/697556980d7cb28d19682fd8
Pulse Author: cryptocti
Created: 2026-01-24 23:32:40

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BlockChain #CyberSecurity #InfoSec #Konni #Malware #OTX #OpenThreatExchange #RAT #SocialEngineering #bot #developers #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Breeding program
In WTA the Ratkin have a secret breeding program. While it's an obligation to participate, I like to think they would make time for fun as well.

#mastoart #traditionalart #furryart #sketchpage #sketchdump #rat #wererat #feral #anthro #werewolftheapocalypse #worldofdarkness #ttrpg #ttrpgart #furrynsfw #nsfw