העדכון שאתם לא יכולים להרשות לעצמכם לדלג עליו: סוף התמיכה ב-Office 2016 ו-Office 2019

קרא עכשיו
אנו משתמשים בבינה מלאכותית לתרגום האתר, ועל אף שאנו שואפים לדיוק מרבי, ייתכן שהתרגומים אינם מדויקים במאת האחוזים. אנו מודים לך על ההבנה.

Following ShadyPanda’s Backdoor, How MetaDefender Endpoint Helps Stop Browser Extension Exploits

עַל יְדֵי OPSWAT
שתף את הפוסט הזה

Remediating ShadyPanda’s Browser Extension Backdoor with MetaDefender Endpoint

Browser extensions often seem harmless to most users, leading to their installation with little to no doubt about their security. This is especially true for those featured and verified by the browser itself, such as Google Chrome. Once installed, such extensions may gain permission to read almost everything a user sees, including email, session data, passwords, keystrokes, and internal tools, which attackers typically aim to exploit.

When the threat actor, known as ShadyPanda, slipped a backdoor into popular browser extensions installed on more than 4,000,000 devices, it demonstrated again how easy it is for attackers to hide within the often-overlooked attack vector of browser extensions.

ShadyPanda’s Attack Wasn’t the First of Its Kind

The ShadyPanda attack is far from an isolated case. In past years, multiple significant browser extension exploitations have surfaced:

  • In 2025, researchers uncovered a campaign of 18 malicious extensions that tracked users’ behavior across Chrome and Edge browsers.
  • In 2023, PDF Toolbox, a Chrome extension that reached over 2 million downloads, was able to inject arbitrary code into every page users visited.
  • In 2019, the DataSpii data leak, with extensions such as Hover Zoom and SpeakIt, involved collecting and exposing users’ personal information, including browsing activity and other identifiable data.
  • In 2017, Archive Poster, a Chrome extension that contained cryptocurrency mining code within its source code.
  • In 2017, Web Developer for Chrome, a popular tool with over one million users, was compromised to inject ads and carry out phishing attacks.

Why Browser Extension Attacks Keep Happening

Browser extensions continue to be a popular attack vector because of several factors:

  1. Auto-Update: Extensions can update automatically without user interaction. If a developer account is compromised or malicious code is slipped into an update, millions of users can be exposed instantly.
  2. High Privileges, Low Scrutiny: Extensions often require broad permissions, including reading and modifying website content, accessing browsing activity, or interacting with files.
  3. Lack of Monitoring: Many organizations don’t monitor which extensions employees install, what permissions they request, or whether updates introduce new threats.
  4. User Trust is Easily Exploited: Users often assume the extensions are safe if they come from a browser store, especially when verified or featured.
  5. Reliance on Ratings Over Security: Many users install extensions based solely on popularity or reviews, granting permission without fully understanding the risks.

Why It Matters

Browser extensions have become one of the most common and easily exploited attack vectors. Attackers don’t need disguised malware or complex techniques to infiltrate a user’s device. A single user clicking “Add to Chrome” is enough to open a direct path into a browser and everything it can access, making it easy to exploit millions of devices before anyone notices.

Once a malicious browser extension is installed, it can:

  • Capture browsing data, credentials, cookies, and session tokens
  • Record keystrokes, exposing passwords, messages, and confidential inputs
  • Read and steal corporate documents, sensitive data, and identifiable information
  • Inject spyware or malicious scripts into any website a user visits
  • Create new attack paths into cloud services and sensitive applications
  • Download additional malicious software in the background without the user's consent
  • Take over accounts
  • Redirect traffic to malicious websites that automatically download malware or use social engineering
  • Load backdoors

Organizations can’t rely on users or browser stores to block these threats. They need automatic, enforced checks at the endpoint.

How MetaDefender Endpoint Helps Stop Browser Extension Exploits

MetaDefender Endpoint enables organizations to manage and control browser extensions in the same way they manage and control applications and USB devices.

1. Detects Unauthorized Extensions

MetaDefender Endpoint scans installed extensions and verifies them against your allowlist and flags any suspicious installations. It ensures that devices with unauthorized extensions are flagged as non-compliant and blocked from accessing critical systems.

2. Gives Admins Full Control and Visibility

With My OPSWAT™ Central Management, security teams can gain oversight into all extensions installed across devices, eliminating blind spots and enabling quick remediation by:

  • Managing and customizing a browser extension allowlist
  • Monitoring what each user or device has installed
  • Monitoring how many devices have installed a specific extension with the installed versions
  • Gaining insights into the devices at risk and which policies were broken

3. Enforces Device Compliance Before Accessing Sensitive Systems

MetaDefender Endpoint actively checks a device’s security posture and compliance status, blocking non-compliant or compromised endpoints from connecting to critical networks.

4. Stops Drive-By Downloads 

If a malicious extension redirects users to harmful sites that trigger automatic downloads, MetaDefender Endpoint’s Download Protection feature adds a crucial safeguard to prevent this. It actively scans and sanitizes files downloaded through web browsers and applications, such as Google Chrome, Microsoft Edge, and WhatsApp, blocking infected payloads before they reach the device.

מחשבות אחרונות

Malicious browser extensions have become a persistent attack vector, and the ShadyPanda incident is a recent reminder. MetaDefender Endpoint helps organizations close this gap by enforcing extension policies, providing centralized management, and preventing unsafe devices from accessing sensitive systems.

Talk to one of our experts today to see how MetaDefender Endpoint can protect your critical systems.

הישאר מעודכן עם OPSWAT !

הירשמו עוד היום כדי לקבל את העדכונים האחרונים של החברה, סיפורים, מידע על אירועים ועוד.