Google Removes 131 Malicious Chrome Extensions Hijacking WhatsApp Web

Cybersecurity researchers uncovered 131 malicious Chrome extensions that hijacked WhatsApp Web sessions to automate spam, affecting 20,905 users mainly in Brazil. These add-ons evaded detection in Google's store, enabling data theft and malware spread. Google removed them, urging users to uninstall and enhance security measures.
Google Removes 131 Malicious Chrome Extensions Hijacking WhatsApp Web
Written by Victoria Mossi

In a startling revelation that underscores the persistent vulnerabilities in browser ecosystems, cybersecurity researchers have uncovered a sophisticated operation involving 131 malicious Chrome extensions designed to hijack WhatsApp Web sessions. These extensions, masquerading as legitimate tools for productivity and communication, were engineered to automate spam campaigns on a massive scale. According to a report from The Hacker News, the scheme primarily targeted users in Brazil, affecting an estimated 20,905 individuals who unwittingly installed the tainted add-ons.

The extensions operated by exploiting WhatsApp Web’s session management, allowing attackers to send unsolicited messages en masse without the user’s knowledge. This hijacking not only facilitated spam but also posed risks of data exfiltration and further malware distribution, highlighting how everyday browser tools can become vectors for cyber threats.

Unpacking the Mechanics of the Attack

Investigators found that these extensions were distributed through Google’s Chrome Web Store, often under innocuous names promising enhanced messaging features or ad blockers. Once installed, they injected malicious scripts into WhatsApp Web interfaces, automating the sending of promotional links, phishing lures, and other spam content. The operation’s scale suggests a coordinated effort, possibly linked to underground networks profiting from affiliate marketing scams or data harvesting.

What makes this incident particularly insidious is the extensions’ ability to evade initial detection. Many passed Google’s automated reviews, only to reveal their true nature post-installation via dynamic updates. As detailed in the The Hacker News analysis, the spam campaigns disrupted personal and business communications, leading to widespread user complaints that tipped off researchers.

Broader Implications for Browser Security

This isn’t an isolated case; similar hijackings have plagued Chrome users in recent years. For instance, earlier in 2025, over 100 fake extensions were exposed for stealing credentials and injecting ads, as reported by The Hacker News. In another episode from 2024, a malware campaign infected 300,000 users via rogue extensions on Chrome and Edge, per the same publication, demonstrating a pattern of attackers exploiting the trust users place in official stores.

Industry experts warn that such threats exploit the decentralized nature of extension development, where developers can push updates without rigorous scrutiny. The Brazil-focused impact in this latest breach—potentially tied to local economic incentives like digital advertising fraud—raises questions about regional targeting in global cyber operations.

Response and Mitigation Strategies

Google has since removed the offending extensions from its store, but remnants may linger on users’ devices, necessitating manual uninstalls and session revocations on WhatsApp. Cybersecurity firms recommend enabling two-factor authentication and regularly auditing installed extensions, advice echoed in coverage from Tom’s Guide, which highlighted a related hack affecting 3.2 million users earlier this year.

For enterprise IT teams, this incident serves as a call to implement stricter browser policies, such as whitelisting approved extensions and deploying endpoint detection tools. As attackers refine their tactics, blending social engineering with technical exploits, the onus falls on both platform providers and users to fortify defenses.

Looking Ahead: Evolving Threats in Extension Ecosystems

The proliferation of such attacks points to a need for enhanced regulatory oversight. Proposals include mandatory code audits for high-download extensions and AI-driven anomaly detection in updates. Drawing from past breaches, like the 2021 CacheFlow extensions that hijacked search results for millions, as covered by The Hacker News, experts predict a rise in hybrid threats combining extension malware with AI-generated lures.

Ultimately, this WhatsApp hijacking saga illustrates the delicate balance between innovation and security in digital tools. As browser extensions continue to empower users, they also empower adversaries, demanding vigilant adaptation from all stakeholders in the tech industry.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us