u/Huge-Skirt-6990

▲ 12 r/chrome+1 crossposts

126 Chrome extensions, all secretly the same product, taking 148K users' WhatsApp data and ad cookies

A Brazilian company (wascript.com.br) runs one platform that 126 different Chrome extensions all share. They look like separate products, WaSeller, waTidy, FR VENDAS PRO, ENOCRM, Cliente Flow, and dozens more, but it's one codebase, one backend, one set of hidden behaviors.

WaSeller alone has 100K users.

I found this network using my own tool for detecting malicious browser extensions, which flagged the cluster by shared code and infrastructure across all 126 listings.

None of the listings tell you that:

  • When you log into WhatsApp Web, the extension sends your name, email, device ID, and your Facebook/Google/TikTok tracking cookies to a server run by whoever sold you the extension.
  • Every voice message you send goes through their servers before it reaches the person you're sending it to.
  • The extension downloads and runs JavaScript from a different Brazilian company's server. Google never checks this code.
  • The 100K-user version has a live Google Tag Manager tag built in. The operator can push any new code to every user from a dashboard with no Chrome Web Store update.
  • A bridge inside WhatsApp Web gives the extension full access to your contacts, your messages, and the ability to send messages as you.

No privacy policy on any listing. The manifest only asks for tabsstoragealarms.

Full list of all 126 extension IDs (check if you have one), tech details, and IOCs: MalExt Sentry - Malicious Browser Extension Tracker

reddit.com
u/Huge-Skirt-6990 — 6 days ago
▲ 27 r/Information_Security+2 crossposts

WaSteal: 126 Chrome extensions, 148K installs, one Brazilian operator silently sending WhatsApp user data and ad cookies to its servers

126 Chrome extensions, all secretly the same product, taking 148K users' WhatsApp data and ad cookies

A Brazilian company (wascript.com.br) runs one platform that 126 different Chrome extensions all share. They look like separate products, WaSeller, waTidy, FR VENDAS PRO, ENOCRM, Cliente Flow, and dozens more, but it's one codebase, one backend, one set of hidden behaviors.

WaSeller alone has 100K users.

I found this network using my own tool for detecting malicious browser extensions, which flagged the cluster by shared code and infrastructure across all 126 listings.

None of the listings tell you that:

* When you log into WhatsApp Web, the extension sends your name, email, device ID, and your Facebook/Google/TikTok tracking cookies to a server run by whoever sold you the extension.

* Every voice message you send goes through their servers before it reaches the person you're sending it to.

* The extension downloads and runs JavaScript from a different Brazilian company's server. Google never checks this code.

* The 100K-user version has a live Google Tag Manager tag built in. The operator can push any new code to every user from a dashboard with no Chrome Web Store update.

* A bridge inside WhatsApp Web gives the extension full access to your contacts, your messages, and the ability to send messages as you.

No privacy policy on any listing. The manifest only asks for `tabs`, `storage`, `alarms`.

Full list of all 126 extension IDs (check if you have one), tech details, and IOCs

malext.io
u/Huge-Skirt-6990 — 6 days ago

126 Chrome extensions, all secretly the same product, taking 148K users' WhatsApp data and ad cookies

A Brazilian company (wascript.com.br) runs one platform that 126 different Chrome extensions all share. They look like separate products, WaSeller, waTidy, FR VENDAS PRO, ENOCRM, Cliente Flow, and dozens more, but it's one codebase, one backend, one set of hidden behaviors.

WaSeller alone has 100K users.

I found this network using my own tool for detecting malicious browser extensions, which flagged the cluster by shared code and infrastructure across all 126 listings.

None of the listings tell you that:

  • When you log into WhatsApp Web, the extension sends your name, email, device ID, and your Facebook/Google/TikTok tracking cookies to a server run by whoever sold you the extension.
  • Every voice message you send goes through their servers before it reaches the person you're sending it to.
  • The extension downloads and runs JavaScript from a different Brazilian company's server. Google never checks this code.
  • The 100K-user version has a live Google Tag Manager tag built in. The operator can push any new code to every user from a dashboard with no Chrome Web Store update.
  • A bridge inside WhatsApp Web gives the extension full access to your contacts, your messages, and the ability to send messages as you.

No privacy policy on any listing. The manifest only asks for tabsstoragealarms.

Full list of all 126 extension IDs (check if you have one), tech details, and IOCs: MalExt Sentry - Malicious Browser Extension Tracker

reddit.com
u/Huge-Skirt-6990 — 7 days ago
▲ 21 r/hackerworkspace+1 crossposts

126 Chrome extensions, all secretly the same product, taking 148K users' WhatsApp data and ad cookies

A Brazilian company (wascript.com.br) runs one platform that 126 different Chrome extensions all share. They look like separate products, WaSeller, waTidy, FR VENDAS PRO, ENOCRM, Cliente Flow, and dozens more, but it's one codebase, one backend, one set of hidden behaviors.

WaSeller alone has 100K users.

I found this network using my own tool for detecting malicious browser extensions, which flagged the cluster by shared code and infrastructure across all 126 listings.

None of the listings tell you that:

  • When you log into WhatsApp Web, the extension sends your name, email, device ID, and your Facebook/Google/TikTok tracking cookies to a server run by whoever sold you the extension.
  • Every voice message you send goes through their servers before it reaches the person you're sending it to.
  • The extension downloads and runs JavaScript from a different Brazilian company's server. Google never checks this code.
  • The 100K-user version has a live Google Tag Manager tag built in. The operator can push any new code to every user from a dashboard with no Chrome Web Store update.
  • A bridge inside WhatsApp Web gives the extension full access to your contacts, your messages, and the ability to send messages as you.

No privacy policy on any listing. The manifest only asks for tabsstoragealarms.

Full list of all 126 extension IDs (check if you have one), tech details, and IOCs: MalExt Sentry - Malicious Browser Extension Tracker

reddit.com
u/Huge-Skirt-6990 — 6 days ago
▲ 20 r/pwnhub

126 Chrome extensions, all secretly the same product, taking 148K users' WhatsApp data and ad cookies

A Brazilian company (wascript.com.br) runs one platform that 126 different Chrome extensions all share. They look like separate products, WaSeller, waTidy, FR VENDAS PRO, ENOCRM, Cliente Flow, and dozens more, but it's one codebase, one backend, one set of hidden behaviors.

WaSeller alone has 100K users.

I found this network using my own tool for detecting malicious browser extensions, which flagged the cluster by shared code and infrastructure across all 126 listings.

None of the listings tell you that:

  • When you log into WhatsApp Web, the extension sends your name, email, device ID, and your Facebook/Google/TikTok tracking cookies to a server run by whoever sold you the extension.
  • Every voice message you send goes through their servers before it reaches the person you're sending it to.
  • The extension downloads and runs JavaScript from a different Brazilian company's server. Google never checks this code.
  • The 100K-user version has a live Google Tag Manager tag built in. The operator can push any new code to every user from a dashboard with no Chrome Web Store update.
  • A bridge inside WhatsApp Web gives the extension full access to your contacts, your messages, and the ability to send messages as you.

No privacy policy on any listing. The manifest only asks for tabsstoragealarms.

Full list of all 126 extension IDs (check if you have one), tech details, and IOCs: MalExt Sentry - Malicious Browser Extension Tracker

reddit.com
u/Huge-Skirt-6990 — 7 days ago
▲ 4 r/pwnhub

​

Researchers flag malicious extensions all the time. The IOCs end up scattered across blog posts, tweets, and reports. But Google can take an eternity to actually act on them, leaving millions of users exposed while everyone waits.

So I built MalExt Sentry. It checks your installed extensions against a daily updated database of flagged ones, including researcher-flagged extensions Google hasn't acted on yet. Scans run locally, no data leaves your browser, fully open source.

Database: https://malext.io

Store extension : https://chromewebstore.google.com/detail/malext-sentry/bpohikihiogjgmebpnbgnloipjaddibe

GitHub: https://github.com/toborrm9/malicious\_extension\_sentry

Always open to feedback. If there's a feature you'd like to see or something that could work better, let me know.

reddit.com
u/Huge-Skirt-6990 — 21 days ago
▲ 78 r/pwnhub

My automated analysis tool flagged this extension. On the surface, it works perfectly fine as an Instagram downloader. But hidden inside is a highly evasive adware payload that runs silently on every website you visit.

Here is exactly what it does:

  • It tracks your browsing: Every time you navigate to a new page, it checks your destination against a list of shopping and affiliate sites.
  • Secretly stuffing affiliate cookies: If you visit a targeted shopping site, the extension opens a hidden, pinned background tab. It runs through an affiliate redirect chain to plant a referral cookie on your browser, then closes the tab 10 seconds later.
  • The dev gets paid: If you make a purchase, the extension author collects the commission for a sale they had absolutely nothing to do with.
  • Remote Control (C2): The scariest part is that the target list and the adware "killswitch" are controlled by a live remote server. The author can add new target sites or turn the malware on/off at any time to easily evade Chrome Web Store reviewers.

Extension: Instagram Downloader by "ulihissens" | ~3,000 users
Extension URL : Instagram Downloader - Chrome Web Store
Full technical report:https://malext.io/#reports/ecocgofdjmiomgmgnchijbghkikolkkl

If you have this installed, remove it immediately and report it on the Chrome Web Store for malicious behavior.

u/Huge-Skirt-6990 — 23 days ago