Back to Articles
high Cyber Attack

Chrome Extensions Turn Malicious After Ownership Transfer: The Supply Chain Attack You Didn't See Coming

Two Chrome Featured extensions, QuickLens and ShotBird, turned malicious after ownership transfer. Attackers stripped security headers, injected C2 payloads via 1x1 pixel images, and deployed ClickFix-style attacks for full endpoint compromise. Extension supply chain attacks are accelerating.

By Danny Mar 9, 2026 2 views

If you've ever installed a browser extension because it had a nice "Featured" badge and good reviews, congratulations — you've done exactly what attackers are counting on. Two Google Chrome extensions just demonstrated why the extension marketplace has become one of the most underrated threat vectors in enterprise security, and the attack method is both elegant and terrifying in its simplicity.

The extensions in question, QuickLens and ShotBird, started their lives as legitimate productivity tools built by an independent developer. QuickLens let users search their screen with Google Lens, while ShotBird promised scrolling screenshots and image editing for social media posts. Both accumulated thousands of users. Both earned Chrome's coveted Featured badge. And both became weapons after their original developer sold them to someone with very different intentions.

This is what security researchers call an ownership transfer attack, and it exploits a fundamental trust problem in how we think about software. When you install an extension, you're trusting not just the code that exists today, but every future update that extension will ever receive. Change the owner, and you've changed who controls that future. The new owners of these extensions wasted no time weaponizing their newly acquired user bases.

The technical execution here deserves attention because it shows just how sophisticated these attacks have become. The malicious updates to QuickLens kept all the original functionality intact — users could still search their screens with Google Lens exactly as promised. But behind that familiar interface, the extension began stripping security headers from every HTTP response the browser received. Those headers, including X-Frame-Options and Content Security Policy protections, exist specifically to prevent malicious code injection. With them gone, the attackers could inject arbitrary scripts into any page the victim visited.

The really clever part was how they delivered the actual malware. The malicious code never appeared in the extension's source files at all. Static analysis would show nothing more suspicious than a function that creates image elements. The actual payloads came from a command-and-control server every five minutes, stored in the browser's local storage, and executed on every page load through a deviously simple trick: they created an invisible 1x1 pixel image and set the JavaScript payload as its onload attribute. When the image loads, the code runs. It's the kind of approach that makes security researchers simultaneously impressed and frustrated.

ShotBird's evolution proved even more aggressive. Beyond the same C2 architecture and runtime code injection, this extension deployed a ClickFix-style attack that displays a fake Google Chrome update prompt. Users who clicked through were presented with instructions to open Windows Run, launch cmd.exe, and paste a PowerShell command. The result was an executable named googleupdate.exe that had nothing to do with Google and everything to do with harvesting credentials, browsing history, saved passwords, and virtually everything else of value in the victim's browser.

The scope of data collection was comprehensive. The malware hooked into input fields, text areas, and selection elements across every website the victim visited. Credit card numbers, authentication tokens, government identifiers, personal messages — anything typed into a form became fair game. On infected systems, the attackers achieved not just browser-level compromise but full endpoint access, pivoting from a simple extension into what security researchers describe as a two-stage abuse chain combining remote browser control with host-level execution.

What makes this attack particularly concerning is how little visibility most organizations have into their browser extension landscape. IT teams meticulously manage endpoint detection, email security, and network monitoring, but browser extensions often fly completely under the radar. The average enterprise employee has somewhere between five and ten extensions installed, each one a potential entry point that updates automatically without any approval process. An extension that was safe last month can become dangerous overnight, and unless you're actively monitoring extension behavior, you won't know until the damage is done.

The original developer's digital footprint adds another layer of intrigue to this story. They maintain several other extensions on the Chrome Web Store, all with Featured badges. They've been active on domain sale forums attempting to sell AI-related domains for thousands of dollars. And most tellingly, QuickLens was listed for sale on ExtensionHub just two days after it was originally published. Whether this represents a developer who builds extensions specifically to sell them to the highest bidder or someone who simply didn't understand the security implications of ownership transfer remains unclear. What's clear is that the Chrome Web Store's review process caught none of this.

This attack pattern isn't isolated. Microsoft recently warned about malicious Chrome extensions masquerading as AI assistants to harvest LLM chat histories and browsing data. Researchers have flagged fake cryptocurrency wallet extensions using phishing redirects to steal seed phrases. Palo Alto Networks identified an extension posing as an AI automation tool that was actually a full remote access trojan. And a campaign spanning over 30,000 domains has been distributing extensions that hijack browser settings and redirect searches through attacker-controlled servers.

The common thread running through all of these is trust exploitation. Users trust the Chrome Web Store. They trust Featured badges. They trust the update process. And attackers have learned that these trust relationships are far more valuable than any technical exploit. Why hunt for zero-days when you can simply buy an extension with an existing user base and push malicious code directly to thousands of browsers?

For organizations serious about security, browser extension governance needs to become a first-class concern. This means visibility into what extensions employees have installed, policies that restrict extension sources to vetted allowlists, and monitoring for behavioral anomalies like unexpected network connections or permission changes. Enterprise browser management solutions can enforce these controls, but only if security teams recognize the threat exists in the first place.

The broader lesson here is that supply chain security extends far beyond traditional software dependencies and CI/CD pipelines. Every piece of code that runs in your environment, including that helpful screenshot tool Karen from accounting installed last year, represents potential attack surface. The attackers understand this. The question is whether defenders will catch up before the next ownership transfer turns another Featured extension into a credential harvesting operation.

QuickLens has been removed from the Chrome Web Store, but ShotBird remained available at the time of this writing. If you have either installed, uninstall them immediately and consider rotating any credentials that may have been exposed. And maybe take a few minutes to audit what other extensions have quietly accumulated across your browser fleet. You might not like what you find.

Target Sectors

EnterpriseSMBAll Industries

Tags

ChromeBrowser ExtensionSupply ChainQuickLensShotBirdClickFixCredential TheftC2Ownership Transfer