ShadyPanda--> The 7-Year Browser Extension Backdoor Hiding in Plain Sight, And How to Protect Yourself Today.

Jim Leone

12/1/20253 min read

When “Trusted” Tools Turn into Spyware...

Most cyber threats today follow familiar patterns - phishing, credential theft, exploited vulnerabilities, malware delivered via suspicious links. But in late 2025, researchers uncovered something far more unsettling... A 7-year-long campaign where completely legitimate, widely-trusted browser extensions silently transformed into full-blown spyware and remote-access tools.

Over 4.3 million Chrome and Edge users were affected.

No phishing. No malicious downloads. No social engineering. Just a malicious update to extensions users already trusted - some even labeled Featured or Verified by Google.

This operation, dubbed ShadyPanda, is one of the clearest demonstrations yet that the browser - not the endpoint - may now be the most valuable real estate for attackers.

And the implications affect everyone --> families, small businesses, enterprises, government, and anyone who uses Chrome or Edge.

The ShadyPanda Campaign and What We Now Know

Researchers at Koi Security traced the campaign across four phases, beginning in 2018.

Phase 1 (2018–2022)--> Build Trust

Attackers published harmless-looking extensions - wallpapers, new tab pages, productivity utilities. Some gained hundreds of thousands of installs and positive reviews.

Phase 2 (2023)--> Silent Affiliate Fraud

Around 2023, the first subtle signs of wrongdoing appeared...

  • Tracking code injections at eBay, Booking.com, Amazon

  • Hijacked affiliate commissions

  • Redirected search queries

Still nothing that would tip off most users.

Phase 3 (Early 2024) --> Active Browser Control

The extensions escalated...

  • Search query harvesting

  • Redirection through trovi.com

  • Cookie collection

  • Behavioral tracking

Phase 4 (Mid-2024) --> Full Remote Code Execution (RCE)

This is where things went critical.

Five long-trusted Chrome extensions - including one called Clean Master - received an update that added...

  • Hourly polling of a command-and-control domain

  • Downloading of arbitrary JavaScript

  • Execution with full browser permissions

  • Encrypted exfiltration of browsing history

  • Full browser fingerprinting

  • Adversary-in-the-middle capabilities

  • Session hijacking

Some of these extensions had been trustworthy for YEARS.

And for Edge, several extensions - including WeTab (3M installs) and Infinity New Tab (650k installs) - remained active as of public disclosure.

Why This Attack Worked... The Real Failure Isn’t the Malware

The extension stores: Chrome Web Store and Microsoft Edge Add-ons - reviewed these extensions only when they were submitted.

Not after. Not ever.

Years later, a malicious developer (or a purchased developer account) simply pushed a poisoned update. And because browser extensions auto-update silently:

  • No warnings

  • No prompts

  • No user interaction

  • No alerts

The very mechanism designed to protect users became the delivery pipeline for spyware.

This is the same soft underbelly that enabled incidents such as:

  • The ColorZilla malware update

  • The Copyfish hijack

  • The User-Agent Switcher takeover

  • The Particle/Polyfill.io supply-chain backdoor

Browser extensions remain one of the most trusted but least monitored pieces of software people install.

Known Extensions Linked to ShadyPanda (Partial Public List)

The true list contains more than 145 extensions across Chrome and Edge - not all publicly catalogued yet.

Below are confirmed examples from public reporting:

Chrome

  • Clean Master - ~200,000 installs (Legitimate for years before turning malicious)

Microsoft Edge

  • WeTab 新标签页 (WeTab New Tab) – ~3 million installs

  • Infinity New Tab (Pro) – ~650,000 installs

Please Note: The above is not the full list. Koi Security reports the complete list contains 20 Chrome and 125 Edge extensions, but the full dataset is not yet available publicly.

How to Check if You’re Exposed

Step 1 - Audit your installed extensions

For Chrome --> chrome://extensions

For Edge--> edge://extensions

Look For ...

  • Wallpaper / new tab page extensions

  • Shopping assistants

  • “Productivity tool” extensions

  • Anything from unfamiliar publishers

  • Anything that hasn’t been updated in years then suddenly recently updated

  • Extensions with extremely high install counts but minimal or suspect reviews

Step 2 - Remove suspicious extensions immediately

If you see any of the above - or ANY extension you don’t absolutely trust - uninstall it.

Do NOT just disable it. Malicious extensions sometimes re-enable themselves.

Step 3 - Rotate all credentials

If you had ANY affected extension installed:

  • Change your passwords (start with email, banking, and work accounts)

  • Log out of all active sessions

  • Monitor for unauthorized activity

Browser-extension spyware can steal:

  • Cookies

  • Session tokens

  • Saved passwords

  • Autofill data

  • Search history

  • Private browsing details

Step 4 - Clear cookies and cached sessions

This forces fresh login tokens everywhere.

Step 5 - For Enterprises... Implement Strict Browser Controls Immediately!

For organizations, this incident is a wake-up call.

Implement:

  • Extension allow-lists (not block-lists)

  • Browser management via Intune/Google Workspace

  • Continuous review of extension update events

  • Network monitoring for suspicious extension-based traffic

  • Session-token hardening (shorter TTLs, device binding)

  • SSO everywhere possible

  • Strict cookie policies

Attackers are now targeting the browser with the same seriousness once reserved for the OS.

What Makes ShadyPanda Different from Normal Malware?

Three things...

1. Users didn't install malware - their browser “updated” into malware.

This bypasses 90% of user-awareness defenses.

2. The extensions were legitimate for years.

Not clones, not lookalikes - real tools that people trusted.

3. Silent backdoor delivery through trusted infrastructure.

The Chrome and Edge update pipelines may become the next frontier for supply-chain warfare.

Why You Should Care Even If You Were Not Affected...

If a seven-year supply chain attack can slip through every browser vendor’s defenses… what else is already sitting dormant?

This incident signals a new era...

Extensions are now a high-value attack vector. Sleepers can be activated at any time. Trust signals (featured, verified, popular) mean very little.

Browser security - for both consumers and enterprises - must evolve immediately.

The Browser Has Basically Become A New Operating System

Attackers go where the data is-->

  • Passwords

  • Tokens

  • Search history

  • Private messages

  • Browsing habits

  • Financial activity

  • Cloud console logins

  • MFA seeds

  • Cookies

  • Corporate credentials

All of it flows through your browser.

ShadyPanda proves one thing clearly:

Your browser is now one of your most vulnerable data assets, and a valuable target.

Audit your extensions today. Educate your teams. Harden your policies. And never assume that “Verified” means “Safe.”