AI Browser Extensions Found Stealing Passwords and Emails in New Security Alert

By ⚡ min read

Breaking: Malicious AI Extensions Compromise Browser Security

Security researchers at Unit 42 have uncovered a wave of high-risk AI browser extensions that covertly steal user data, intercept email prompts, and exfiltrate passwords. These extensions, masquerading as productivity tools, pose an immediate threat to millions of users.

AI Browser Extensions Found Stealing Passwords and Emails in New Security Alert
Source: unit42.paloaltonetworks.com

“The extensions appear legitimate—they help draft emails or summarize text—but behind the scenes, they’re reading every keystroke and capturing credentials,” said Dr. Elena Vargas, a senior threat analyst at Unit 42. “We advise users to remove any unfamiliar AI extensions immediately.”

Unit 42’s investigation reveals that the malicious code activates when users install the extension and grant permissions to access browser data. The attackers then intercept AI prompts and responses, exfiltrating sensitive information to remote servers.

Background: The Rise of Compromised Productivity Tools

The discovery comes amid a surge in AI-powered browser extensions designed to automate tasks like email drafting, note-taking, and text summarization. While many are legitimate, cybercriminals have begun replicating functionality with hidden malware.

Unit 42’s report notes that these extensions often appear in official browser stores with high ratings and thousands of downloads, luring unsuspecting users. Once installed, they can:

  • Intercept email content before it’s sent
  • Capture login credentials entered on websites
  • Exfiltrate API keys and other sensitive data

“The extensions use sophisticated obfuscation to evade detection,” added Dr. Vargas. “This is not a simple script—it’s a full-fledged espionage toolkit.”

AI Browser Extensions Found Stealing Passwords and Emails in New Security Alert
Source: unit42.paloaltonetworks.com

What This Means: Urgent Action Required

For users, the implications are severe. Any AI extension installed in the past months could be leaking private emails, passwords, and corporate data. Unit 42 recommends immediately reviewing browser extensions and removing any not explicitly trusted.

Businesses should enforce strict extension whitelists and conduct security audits. “The attack surface is wider than many realize,” said cybersecurity consultant Mark Tan. “We’re seeing initial access brokers actively peddling credentials stolen through these extensions.”

To protect yourself:

  1. Disable or remove all AI writing extensions
  2. Change passwords for sensitive accounts
  3. Enable two-factor authentication wherever possible

Unit 42 continues to monitor the threat and will release a full technical analysis next week. In the meantime, the message is clear: If an extension promises to write your emails, it might be reading them—and everything else—first.

Recommended

Discover More

How to Safeguard Your Enterprise from Shadow AI Agents with Microsoft Agent 365Kubernetes v1.36: Smarter Kubelet API Security with Granular Authorization Now StableHistoric Community Benefit Deal Signed for Massive Wind-Solar-Battery Farm Under Tough New RulesNew 'Design Organism' Framework Ends Design Manager vs Lead Designer Conflict10 Critical Lessons from the SAP npm Package Attack on Developer Tools and CI/CD Pipelines