Have you ever wondered if the extensions you install on your browser might hide malicious intentions? As we browse the Internet daily, some hacker groups are devising ingenious methods to turn seemingly innocent tools into real threats. Discover how the DarkSpectre group exploits this technique to spy on millions of users worldwide.
The 3 key facts not to miss
- The hacker group DarkSpectre has infected approximately 8.8 million users worldwide.
- The ZoomStealer campaign has turned productivity extensions into espionage tools.
- Technical clues suggest the involvement of an actor linked to China.
DarkSpectre and its infiltration methods
Researchers at Koi Security have identified a hacker group named DarkSpectre, which has infected millions of users worldwide. Active for over seven years, this collective specializes in infecting web browsers by publishing free and useful extensions.
Their strategy is to gain users’ trust and then turn these extensions into malware through updates. This scheme has been applied on extension marketplaces for browsers such as Chrome, Firefox, and Opera.
The ZoomStealer campaign: targeted espionage
Among DarkSpectre’s recent operations, the ZoomStealer campaign is particularly notable. It relies on the use of 18 different extensions, disguised as productivity tools such as video extractors or audio recorders. These extensions request extensive permissions on more than 28 services, including Zoom and Microsoft Teams.
Once installed, they become sophisticated espionage devices, capable of collecting sensitive information during online meetings. The extracted data includes meeting links, session IDs, as well as detailed information about participants and organizers.
The implications of espionage by DarkSpectre
The ZoomStealer campaign has already infected 2.2 million machines and represents a new step for DarkSpectre. This group, once known for mass surveillance operations, is now moving towards targeted intelligence on companies. The collected information allows mapping the interests of organizations, paving the way for sophisticated phishing campaigns.
Clues point to a Chinese origin
Researchers at Koi Security have identified technical clues suggesting a connection between DarkSpectre and an actor linked to China. Among these clues are infrastructures hosted on Alibaba Cloud, code comments in Chinese, and specific activity hours.
Context of DarkSpectre and cyber threats
DarkSpectre is part of an ever-evolving cyber threat landscape, where organized groups exploit vulnerabilities to achieve their goals. For several years, cyberattacks have been multiplying, targeting both individual users and large companies.
Cybercriminals, such as DarkSpectre, exploit technological advances and system vulnerabilities to carry out their operations. Vigilance and user awareness remain essential to protect against these increasingly sophisticated threats.







