Pixel Perfect: Sold Extension Injects Code Through Pixel
A Google Lens extension that was sold gets weaponized overnightβstripping browser security headers and using a 1x1 GIF onload trick to execute C2-delivered JavaScript on every page
We tracked this one from the moment it was listed for sale Oct 11th, through the ownership change, to the malicious update Feb 17th. Full technical breakdown of the pixel trick, the C2 infrastructure, and the CSP stripping.
annex.security/blog/pixel-p...
26.02.2026 23:49
π 0
π 1
π¬ 0
π 0
The original extension still works perfectly. Google Lens integration, screen capture, all of it. Users would never notice anything beyond a single permission acceptance prompt. That's what makes extension supply chain attacks so dangerous.
26.02.2026 23:49
π 0
π 0
π¬ 1
π 0
The new owner added a C2 server, stripped important security headers from all pages, and used a 1x1 invisible pixel's onload handler to execute remote JavaScript in pages. The actual malicious code never appears in the extension's source files, but the code update was worrying
26.02.2026 23:49
π 0
π 0
π¬ 1
π 0
A Chrome extension with 7,000 users and a Google Featured badge was recently sold, weaponized, and pushed a malicious update to that executed code through a hidden pixel. Here's how it worked π
26.02.2026 23:49
π 0
π 0
π¬ 1
π 0
LimaCharlie released their Agentic SecOps Workspace recently which runs Claude Code in their UI including MCP servers. It's never been so easy to just say 'look at my detections and research the extensions'. Even though 1Password falls under an unapproved policy, at least it isn't malicious!
04.02.2026 21:16
π 0
π 0
π¬ 0
π 0
What a mess and this isn't the first time this has happened!
oorzc.mind-map@1.0.61
oorzc.i18n-tools-plus@1.6.8
oorzc.ssh-tools@0.5.1 (removed)
oorzc.scss-to-css-compile@1.3.4
It is these incremental compromises that will become a widespread incident.
31.01.2026 18:28
π 0
π 0
π¬ 1
π 0
1. Your extension will auto update
2. The malicious versions will be removed from Open VSX so no trace
3. Your extension will not downgrade itself
4. Victims will have to wait until the real developer publishes a new version to update
5. If the extensions are removed, they won't uninstall
31.01.2026 18:28
π 0
π 0
π¬ 1
π 0
As predicted - "oorzc" a developer with extensions totalling 25,000 legitimate installs across 4 extensions looks to have had their Open VSX account compromised and published malicious updates. The worst part is this...
31.01.2026 18:28
π 1
π 0
π¬ 1
π 0
Worms lurking in code extensions
Worms are hiding discreetly in extension marketplaces waiting to trigger the next mass scale event.
The next supply chain worm has been seeded in Open VSX. A cloned Angular extension with 5000 downloads has been available for two weeks and was updated with malware 6 days ago. This multi stage attack uses etherhiding, gcal c2, rust implants, and more.
annex.security/blog/worms-l...
28.01.2026 22:04
π 2
π 2
π¬ 0
π 1
Small Tools, Big Risk: When Browser Extensions Start Stealing API Keys
Obsidian Security identifies a set of 25 extensions impersonating popular AI providers affecting over 500,000 real users by stealing API keys, prompt poaching, and capturing search queries. It's the wild west in the extension store!
www.obsidiansecurity.com/blog/small-t...
28.01.2026 00:38
π 0
π 1
π¬ 0
π 0
If you've had to listen to me over the last couple months, it's likely you would've hear me say that all of our most important apps will have extensions or plugins for integration. Think we're learning from past mistakes?
19.01.2026 15:02
π 1
π 0
π¬ 0
π 0
PasteReady: Danger of sold extensions
The PasteReady browser extension (dcbikjphkkgmgmjoohmbnhccbndgpmin) was sold and the new owner pushed malware immediately after taking ownership. PasteReady was put up for sale on http://extensionhub.
A browser extension, PasteReady, was listed for sale last May became malicious after an ownership transfer on December 27th. Many organizations have been impacted by extensions which changed hands. @secureannex.com watches for transfers and warns you in advance!
www.linkedin.com/pulse/paster...
16.01.2026 16:25
π 1
π 0
π¬ 0
π 0
Loving a new detection that identifies code extensions published by new and lightly used GitHub accounts.This time it instantly caught an extension impersonating JFrog which already has over 10k downloads.
08.01.2026 16:57
π 2
π 1
π¬ 0
π 0
Not the "pulling a Rabbit out of a hat" magic trick that most want. This Firefox extension completely changes from a "Simple Label Editor" to a Rabby wallet stealer overnight.
05.01.2026 19:35
π 1
π 1
π¬ 0
π 0
Prompt poaching runs rampant in extensions
Web analytics companies are using browser extensions to monetize your most private thoughts
A browser extension with over a million users is poaching the prompts of leading AI chat tools.
SimilarWeb loads obfuscated remote configuration to collect the prompts, responses and metadata of your conversations. Your private thoughts are analytics companies gain.
secureannex.com/blog/prompt-...
29.12.2025 16:08
π 0
π 0
π¬ 0
π 0
These code comments are an improvement from:
1. Request malware
2. Download malware
3. Make malware executable
4. Run malware
This is the extent of the extension available in the VS Marketplace. Installs a Mythic agent from the C2.
17.12.2025 15:18
π 3
π 0
π¬ 0
π 0
Monitoring a large influx of AI slop extensions that are reposting a marginally refactored but known malicious package. The marketplace listings are packed with emojis and a couple sections of 'features'. This one made the mistake of linking to an already known piece of malware.
10.12.2025 20:15
π 2
π 0
π¬ 0
π 0
Welcome to Antigravity the newest most advanced agentic AI development tool by Google...
... uses Open VSX for extensions and shows malicious listings to users.
09.12.2025 16:51
π 1
π 0
π¬ 0
π 0
Changing how an extension looks in a marketplace doesn't require new code to be pushed. Check out the magic when this "Test Extension" magically turns into a "solidity" extension after being published. Review the full lineage of a marketplace listing using the new date picker in Secure Annex.
05.12.2025 15:01
π 2
π 0
π¬ 0
π 0
Vibed coded malicious extensions are getting out of hand!
This 'theme' downloads a malicious zip, unpacks it, and runs it silently with PowerShell.
05.12.2025 00:17
π 1
π 0
π¬ 0
π 0
16 Firefox extensions with the almost the same name, same permhash requesting the most sensitive permission combinations like <all_urls> and cookies. Something being staged?
02.12.2025 16:01
π 1
π 0
π¬ 0
π 0
Glassworm stays prevalent
Glassworm attacks look to take full advantage of the holidays
Glassworm returned in a big way during the holiday. We're tracking 23 code extensions across the VS Marketplace and Open VSX which copy popular extensions, evade filters, manipulate their download counts, and then update with sinister malware.
secureannex.com/blog/glasswo...
01.12.2025 05:22
π 2
π 2
π¬ 0
π 0
Resembles Glassworm signatures loading a rust binary. Some of the activation code is tucked into copied extensions, but still runs on activate.
01.12.2025 04:02
π 0
π 0
π¬ 0
π 0
Malware in Open VSX and available in Cursor right now
tailwind-nuxt.tailwindcss-for-react
flutcode.flutter-extension
yamlcode.yaml-vscode-extension
01.12.2025 04:02
π 0
π 0
π¬ 1
π 0
vims-vsce.vscode-vim
yamlcode.yaml-vscode-extension
solblanco.svetle-vsce
Open VSX:
saoudrizvsce.claude-dev
saoudrizvsce.claude-devsce
vitalik.solidity
3/3
28.11.2025 16:28
π 0
π 0
π¬ 0
π 0
prisma-inc.prisma-studio-assistance
prettier-vsc.vsce-prettier
flutcode.flutter-extension
csvmech.csvrainbow
codevsce.codelddb-vscode
saoudrizvsce.claude-devsce
clangdcode.clangd-vsce
cweijamysq.sync-settings-vscode
bphpburnsus.iconesvscode
klustfix.kluster-code-verify
2/3
28.11.2025 16:28
π 0
π 0
π¬ 1
π 0
Unprecedented code extension attacks this week. All are name squatting on popular tools. Only a couple have had malware deployed, many are still staging, few have been removed from marketplaces. There may be more coming.
VS Marketplace:
iconkieftwo.icon-theme-materiall
1/3
28.11.2025 16:28
π 0
π 0
π¬ 1
π 0
Imagine how useful it would be if the Chrome Web Store showed you users over time. This ad blocker went from 0 to 40,000 users overnight! π€
24.11.2025 14:38
π 1
π 0
π¬ 0
π 0