• Platform
  • Pricing
  • About
  • News
  • Blog
  • Help
  • Login
  • Book Now

Solutions

Explore everything you need to protect your workforce.

Ai security

Shadow SaaS
Data Leakage
Real-Time User Guidance
Phishing Protection

Browser security

Browser Observability
Authentication Governance
Back to News

SC Media: ShadyPanda exploited Chrome, Edge browser extensions for 7 years

On This Page
TOC Element
Share:
Neon Cyber
Published on: 
December 2, 2025

Published originally on December 2, 2025 by Steve Zurier on SC Media.

‍

In what experts call one of the most advanced and long-running browser supply chain attacks they’ve seen, threat group ShadyPanda leveraged the auto-update mechanisms in Google Chrome and Microsoft Edge browsers to exploit the same vulnerability for seven years.

...

ShadyPanda changed its strategy again in early 2024 when it released a false productivity tool called Infinity V+ that sent users to trovi[.]com while also stealing cookies, reading what they typed in the search box, and profiling them in real time. This wasn’t smash-and-grab cybercrime; this was structured, scalable surveillance.

...

Cody Pierce, co-founder and CEO at Neon Cyber, added that the increase in malicious software add-ons, most notably Chrome Web Store extensions, is a strong indicator that the value of corporate or personal browsing activity, identities, and access to third-party SaaS tokens is a powerful ROI for attackers.

“Threat actors know that the browser is the operating system of business, and it's relatively easy to publish an extension to the Chrome Web Store,” said Pierce. “This creates an incentive to discover and exploit various activities for financial gain or initial access. The browser will remain a prime target for all kinds of clever attacks.“

Pierce offered four ways teams can defend against malicious Chrome extensions:

  • Enumerate all extensions currently installed across the enterprise.
  • Alert on new extension installations, including the permissions they grant.
  • Update or revise software usage policies to include third-party add-ons and train staff.
  • Include known malicious extension IDs in the organization's IoC or threat hunting playbooks.

‍

Read the full article on SC Media.

Protect the people that power your business

Subscribe to the Neon Glow-Up

Subscribe
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Follow Us

Company

Platform
About us
News
Blog

Platform

Browser Observability for SecOps & GRC
AI & Shadow SaaS Visibility and Control
AI Data Leakage & Insider Risk
AI Guardrails & Real-time User Guidance
AI-Powered Phishing & Social Engineering Defense
Authentication & Identity Hygiene
© {{year}} Copyright. All Rights Reserved.
Privacy Policy
Terms and Conditions