AI Browser Extensions Found Stealing User Data – Experts Warn of Widespread Threat
Urgent Warning: Malicious AI Extensions Compromise Browser Security
Security researchers at Unit 42 have uncovered a wave of high-risk AI browser extensions that pose a serious threat to user privacy. Disguised as helpful productivity tools for writing emails or generating text, these extensions are secretly stealing data, intercepting user prompts, and exfiltrating passwords.

According to a report released today, the extensions have been downloaded by hundreds of thousands of users across multiple browser platforms. The researchers urge immediate action to identify and remove such threats from browsers before further damage occurs.
Key Findings
Unit 42's threat analysis team identified three primary malicious capabilities common to these extensions:
- Data Theft: The extensions capture keystrokes and form inputs, including login credentials, personal messages, and confidential emails.
- Prompt Interception: They read AI prompts sent by users to legitimate services, potentially exposing sensitive business strategies or private correspondence.
- Password Exfiltration: Stolen credentials are encrypted and sent to remote servers controlled by attackers, enabling account takeovers.
“This is not just a privacy issue; it's a direct security breach that can lead to account takeovers and identity theft,” said Dr. Anna Liu, lead threat analyst at Unit 42. “Users often assume browser extensions are safe because they are popular, but our analysis shows a growing trend of malicious add-ons mimicking trusted tools.”
Background
The threat was identified during a routine scan of browser extension repositories. Unit 42's team found multiple extensions with similar malicious codebases, all marketed as AI writing assistants that promise to enhance productivity in email and document composition.
These extensions request extensive permissions, such as access to all website data and the ability to modify content. Once installed, they intercept HTTP requests and inject scripts to capture sensitive information in real time.

Some extensions have been removed from official stores following Unit 42's notification, but many remain available for download. The researchers emphasize that the threat is ongoing and may evolve as attackers modify their code.
What This Means
Users must be vigilant when installing browser extensions, especially those claiming AI capabilities. Check permissions carefully and avoid granting unnecessary access to websites or data.
“We recommend using only well-reviewed extensions from trusted developers, and regularly auditing your installed add-ons,” added Liu. “If you notice unusual behavior—such as frequent login prompts, redirects, or slow browser performance—run a security scan immediately.”
The discovery highlights the evolving tactics of cybercriminals who exploit the popularity of AI tools. Organizations should enforce strict extension policies for employees, including whitelists for approved add-ons and periodic reviews of browser security settings.
Steps to Protect Yourself
- Review all currently installed browser extensions and remove any that are unfamiliar or unnecessary.
- Check permissions for each extension—deny those that request access to all website data unless essential.
- Use browser security tools from vendors like Palo Alto Networks to detect malicious extensions.
- Enable automatic updates for both browsers and extensions to patch known vulnerabilities.
Act now: Protect your browser by following the steps above and stay tuned for further updates from Unit 42 on this developing threat.
Related Articles
- Your Guide to April 2026 Linux App Updates: Install and Upgrade Like a Pro
- Harnessing AI for Accessible Image Descriptions: A Practical Guide
- The AI Revolution in Software Development: Key Questions Answered
- 10 Alarming Ways the GUARD Act Could Restrict Your Daily Online Activities
- Anthropic Unveils Claude Code Auto Mode: Autonomous Coding with Human Oversight Gates
- Your Top Questions Answered: SkiaSharp 4.0 Preview 1 Explained
- Exploring Ptyxis: Tab Management and Color Schemes
- The Hidden Danger After Wildfires: How Burned Land Unleashes Catastrophic Flooding