Seven-Year ShadyPanda Attack Targeted 4.3 Million Chrome and Edge Users

Cybersecurity researchers from Koi Security have uncovered a significant espionage scheme orchestrated by a group dubbed ShadyPanda, which has compromised over 4.3 million users of Chrome and Microsoft Edge over the course of roughly seven years. The attackers employed a methodical and deceptive approach by uploading seemingly innocuous browser extensions that gained user trust before transforming into sophisticated spyware.

The investigation revealed two primary operations: one involved a remote code execution (RCE) backdoor affecting approximately 300,000 users through popular extensions like Clean Master, while the other constituted a widespread spyware campaign impacting around 4 million users via extensions such as WeTab.

The Evolution of Deception

ShadyPanda’s success hinged on exploiting user trust over an extended period, initially engaging in minor cybercriminal activities. In 2023, the group launched a sizable campaign utilizing 145 applications disguised as wallpaper or productivity tools under names such as ‘nuggetsno15’ and ‘Zhang’ for the purpose of affiliate fraud.

By embedding tracking codes within links to sites like eBay and Amazon, the attackers generated concealed commissions. In 2024, they escalated their tactics, gaining active control of users’ browsers by redirecting searches through a known hijacker called trovi.com and harvesting real-time search data. To evade detection, the malware exhibited benign behavior when a security analyst accessed the browser’s developer tools.

The Two Major Active Threats

Threat 1: The RCE Backdoor Attack (300,000 Users)

This operation emphasized a long-term strategy by capitalizing on extensions that had operated legitimately for years. Extensions such as Clean Master, boasting over 300,000 installations, had even attained Google’s “Featured” and “Verified” designations. However, in mid-2024, a covert update altered their functionality, turning the routine update mechanism—intended for user protection—into an effective attack vector unbeknownst to users.

The modified extensions transformed into a backdoor employing Remote Code Execution (RCE), allowing attackers to execute arbitrary code on compromised machines. These extensions periodically queried an external server for new instructions, enabling ShadyPanda to track user activities, monitor visited websites, and compile a complete browser fingerprint, as detailed in Koi Security’s findings.

Source: Koi Security

Threat 2: The Spyware Empire (4 Million Users)

A considerable separate operation involved five extensions, prominently WeTab, which had accumulated three million installations. This campaign actively gathered data on every URL accessed, all search terms entered, and even user mouse clicks, with the collected information sent to servers based in China.

Source: Koi Security

The implications extend beyond individual users; for organizations, malware-infected devices could lead to the theft of API keys and exposure of sensitive internal systems. This ongoing assault highlights a significant vulnerability: official extension marketplaces tend to prioritize the initial submission process while neglecting ongoing monitoring of behavioral changes over time. ShadyPanda adeptly capitalized on this oversight to amass a considerable user base before executing their malicious initiatives.

Ultimately, the ShadyPanda incident underscores how trust became the primary weakness. Users must exercise caution regarding the extensions they install, irrespective of high ratings, to mitigate the risk of similar silent attacks in the future.

Expert Commentary

Cybersecurity specialists have weighed in on the ramifications of the ShadyPanda operation, calling attention to its risks to businesses. Experts emphasize that this case represents one of the most advanced, enduring browser supply chain threats encountered to date. The slow, deliberate strategy employed by the attackers reveals their awareness of how trust can be manipulated over time as they leveraged trust badges from Google to mask their true intentions.

As cyber threats grow in complexity, organizations must adopt a proactive defense approach, emphasizing the importance of ongoing monitoring and risk assessment to counteract such sophisticated attacks and maintain cybersecurity integrity.

Source