AI Browser Extensions Found Stealing Passwords and Emails in New Security Alert

Breaking: Malicious AI Extensions Compromise Browser Security

Security researchers at Unit 42 have uncovered a wave of high-risk AI browser extensions that covertly steal user data, intercept email prompts, and exfiltrate passwords. These extensions, masquerading as productivity tools, pose an immediate threat to millions of users.

AI Browser Extensions Found Stealing Passwords and Emails in New Security Alert
Source: unit42.paloaltonetworks.com

“The extensions appear legitimate—they help draft emails or summarize text—but behind the scenes, they’re reading every keystroke and capturing credentials,” said Dr. Elena Vargas, a senior threat analyst at Unit 42. “We advise users to remove any unfamiliar AI extensions immediately.”

Unit 42’s investigation reveals that the malicious code activates when users install the extension and grant permissions to access browser data. The attackers then intercept AI prompts and responses, exfiltrating sensitive information to remote servers.

Background: The Rise of Compromised Productivity Tools

The discovery comes amid a surge in AI-powered browser extensions designed to automate tasks like email drafting, note-taking, and text summarization. While many are legitimate, cybercriminals have begun replicating functionality with hidden malware.

Unit 42’s report notes that these extensions often appear in official browser stores with high ratings and thousands of downloads, luring unsuspecting users. Once installed, they can:

“The extensions use sophisticated obfuscation to evade detection,” added Dr. Vargas. “This is not a simple script—it’s a full-fledged espionage toolkit.”

AI Browser Extensions Found Stealing Passwords and Emails in New Security Alert
Source: unit42.paloaltonetworks.com

What This Means: Urgent Action Required

For users, the implications are severe. Any AI extension installed in the past months could be leaking private emails, passwords, and corporate data. Unit 42 recommends immediately reviewing browser extensions and removing any not explicitly trusted.

Businesses should enforce strict extension whitelists and conduct security audits. “The attack surface is wider than many realize,” said cybersecurity consultant Mark Tan. “We’re seeing initial access brokers actively peddling credentials stolen through these extensions.”

To protect yourself:

  1. Disable or remove all AI writing extensions
  2. Change passwords for sensitive accounts
  3. Enable two-factor authentication wherever possible

Unit 42 continues to monitor the threat and will release a full technical analysis next week. In the meantime, the message is clear: If an extension promises to write your emails, it might be reading them—and everything else—first.

Tags:

Recommended

Discover More

Enhancing Controller Reliability in Kubernetes v1.36: Tackling Staleness and Boosting ObservabilityStanford's TreeHacks 2026: A 36-Hour Marathon of Innovation and Social Impact10 Crucial Updates About GitHub Copilot's New Usage-Based PricingCommand-Line Observability: How gcx Bridges the Gap Between Agents and ProductionAnbernic RG Rotate: A Retro Handheld with a Unique Flip-Out Screen Starting at $88