FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

GhostPoster Malware Found In 17 Browser Extensions

Gregory Zuckerman
Last updated: January 23, 2026 7:13 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

Security researchers have uncovered a stealthy malware campaign dubbed GhostPoster embedded inside popular browser extensions for Chrome, Firefox, and Edge. Seventeen add-ons — replicated across multiple browser stores as 34 variants — were pulled from official marketplaces, but they remain active if already installed, meaning users need to remove them immediately.

Investigators at Koi Security and LayerX say the extensions packed a multi‑stage payload that monitored browsing, degraded web security controls, injected tracking code, and even opened a route for remote code execution. The kicker: the malicious code was hidden inside the extension’s PNG logo, a clever piece of steganography that helped the campaign fly under the radar for years.

Table of Contents
  • Which Extensions Are Affected by GhostPoster
  • How GhostPoster Worked Inside Extensions
  • What You Should Do Now to Stay Protected
  • Why Detection Took So Long for GhostPoster
  • Guidance for Individuals and Teams to Reduce Risk
  • Bottom Line on the GhostPoster Extension Campaign
A 16:9 aspect ratio image featuring the AdBlocker Ultimate logo with a hedgehog character, set against a blue background with a subtle wave pattern.

Which Extensions Are Affected by GhostPoster

Researchers attribute the GhostPoster operation to these names (with clones across stores):

  • Google Translate in Right Click
  • Translate Selected Text with Google
  • Ads Block Ultimate
  • Floating Player – PiP Mode
  • Convert Everything
  • YouTube Download
  • One Key Translate
  • AdBlocker
  • Save Image to Pinterest on Right Click
  • Instagram Downloader
  • RSS Feed
  • Cool Cursor
  • Full Page Screenshot
  • Amazon Price History
  • Color Enhancer
  • Translate Selected Text with Right Click
  • Page Screenshot Clipper

Some were widely adopted. LayerX notes that Google Translate in Right Click alone amassed more than 500,000 installs before takedown. The blend of familiar utility categories — ad blockers, translators, downloaders, and screenshot tools — made the malicious extensions easy to trust at a glance.

How GhostPoster Worked Inside Extensions

Koi Security describes GhostPoster as a modular, staged loader. The first stage concealed in the PNG asset would unpack additional scripts after installation. From there, the extension used browser APIs to watch visited URLs, intercept and alter network requests, and modify page content by inserting iframes and tracking scripts.

Researchers report several impacts: weakening site protections such as content security policies, hijacking affiliate traffic to monetize visits, persistent surveillance of browsing history, and creating hooks that could enable remote code execution. By abusing permissions common to “power-user” extensions — like “read and change all your data on all websites” — the malware blended into normal behavior profiles.

A cartoon hedgehog holding a shield with a lock icon, standing next to a laptop displaying various ad-blocking elements and the text Block ALL ADS, ADS ARE NOT WELCOME. The image has been resized to a 16:9 aspect ratio.

What You Should Do Now to Stay Protected

  1. Manually audit your extensions. In Chrome, Firefox, and Edge, open your extensions menu and remove any name from the list above. If you don’t recognize a tool or it demands sweeping permissions without a clear need, remove it.
  2. Clear synced copies. After uninstalling, reset your browser’s sync from your account settings so a removed extension does not silently resurface on other devices.
  3. Scan your system. Run a reputable endpoint security scan to check for residual scripts or changes GhostPoster may have introduced.
  4. Review account activity. Since the malware tracked browsing and injected code, monitor important accounts for suspicious sign-ins or unusual transactions and enable multi-factor authentication wherever possible.

Why Detection Took So Long for GhostPoster

GhostPoster’s use of steganography is unusual in the extension ecosystem. Hiding code in an image asset, then assembling the payload in multiple steps, reduces the likelihood that static analysis or automated store reviews will flag it. Its operators also leaned on generic, unbranded extension names and utility categories that users routinely search for, minimizing scrutiny.

LayerX emphasizes that the campaign leveraged common extension capabilities in uncommon ways. For example, access to modify webpages is standard for translators and ad blockers, but GhostPoster used similar privileges to rewrite pages and reroute traffic for surveillance and monetization.

Guidance for Individuals and Teams to Reduce Risk

For everyday users: restrict installs to extensions with transparent publishers, recent update histories, and large volumes of genuine reviews; scrutinize permission prompts; and periodically prune your extension list. A leaner browser is a safer browser.

For organizations: adopt an extension allowlist, enforce policy-based controls via Chrome Enterprise or similar tools, and monitor for anomalous browser behaviors such as unexpected affiliate redirects or injected iframes on trusted domains. Security teams should inventory extensions as part of asset management and consider disabling broad “read and change data on all sites” permissions unless explicitly needed.

Bottom Line on the GhostPoster Extension Campaign

GhostPoster shows that malicious actors will exploit the convenience of extensions to gain durable, lucrative footholds in the browser. If any of the 17 names above are installed, remove them now, reset sync, and run a security check. Quick cleanup today can prevent weeks of covert tracking and code injection tomorrow.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Oura Ring Alert Predicted Illness Before Symptoms
PowerBoy Retro Power Bank With 1,500 Games Gets 37% Off
Meta Pauses Teen Access to AI Characters Across Apps
FTC Warns Of IRS Impostor Texts And Emails
Apple Mac mini M4 Drops to $499 at Amazon
LG UltraGear 39-inch OLED Monitor Price Slashed Over $700
Gmailify Shuts Down Ending Gmail Perks For Other Inboxes
Google Shuts Down Gmailify For Third-Party Inboxes
Kindle Paperwhite Like-New Gets 20% Price Cut
Google Smart Home Outage Hits Lights And Switches
Honor Magic V6 Set For Early MWC Premiere
Meta Halts Teen Access To AI Characters Ahead Of Relaunch
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.