Security researchers at Socket have uncovered over 100 malicious Chrome extensions that steal OAuth2 tokens, hijack Telegram sessions, and inject ads, all linked to a Russian malware-as-a-service operation. This campaign poses significant risks to user data security and privacy, highlighting the need for vigilance among developers and tech professionals in monitoring and securing browser extensions. Users should immediately check their installed extensions against Socket’s list and remove any suspicious ones.
Read the full article at gHacks Technology News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



