Date: May 15, 2025
An ongoing trojan malware campaign has been caught by researchers infecting thousands of Google Chrome and Microsoft Edge browsers.
Cybersecurity researchers have found an ongoing trojan malware campaign that is hijacking web browsers to steal confidential information. This sophisticated campaign targets Google Chrome and Microsoft Edge browsers masked as free popular software like Roblox FPS Unlocker, VLC media player, KeePass, Steam, and YouTube.
The single malicious campaign has hit over 300,000 Google Chrome and Microsoft Edge users globally. The victims fell for the impressively lookalike websites of mainstream tech giants like YouTube to install trojan malware that has been around since 2021. This malware has the power to take over control of the installation and task execution of multiple browser extensions and add-ons.
"The trojan malware contains different deliverables ranging from simple adware extensions that hijack searches to more sophisticated malicious scripts that deliver local extensions to steal private data and execute various commands"
- Spokesperson (ReasonLabs research team)
The malware also changes the default search engine to the user's preferred one, which keeps bouncing back even when users change it back to their original one. These search engines serve as a convenient playground for running ads or deploying more dangerous malware. Earlier, this malware was hidden in cracked versions of paid softwares that many websites offered for free.
The most dangerous part about these malware is that they cannot be removed from the system without a tough fight. Major antivirus software leaves the malware unnoticed or cannot be removed from the system, even though it has existed for over three years by now. The extensions enabled by the malware cannot be disabled even in Developer mode. Newer versions of the malware have scripts that can easily remove browser updates that identify or delete the extensions.
One way to remove this malware from browsers is to eliminate it from the system folders themselves. This effort includes deleting scheduled tasks that reactivate the malware and removing registry entries and their associated files and folders as named below:
Users who find these folders in their system can also check if their sensitive data was pawned online. To safeguard themselves against monetary losses, these systems must remove all confidential data, including passwords, financial credentials, and other personal documents.
By Arpit Dubey
Arpit is a dreamer, wanderer, and tech nerd who loves to jot down tech musings and updates. With a knack for crafting compelling narratives, Arpit has a sharp specialization in everything: from Predictive Analytics to Game Development, along with artificial intelligence (AI), Cloud Computing, IoT, and let’s not forget SaaS, healthcare, and more. Arpit crafts content that’s as strategic as it is compelling. With a Logician's mind, he is always chasing sunrises and tech advancements while secretly preparing for the robot uprising.
OpenAI Is Building an Audio-First AI Model And It Wants to Put It in Your Pocket
New real-time audio model targeted for Q1 2026 alongside consumer device ambitions.
Nvidia in Advanced Talks to Acquire Israel's AI21 Labs for Up to $3 Billion
Deal would mark chipmaker's fourth major Israeli acquisition and signal shifting dynamics in enterprise AI.
Nvidia Finalizes $5 Billion Stake in Intel after FTC approval
The deal marks a significant lifeline for Intel and signals a new era of collaboration between two of America's most powerful chipmakers.
Manus Changed How AI Agents Work. Now It's Coming to 3 Billion Meta Users
The social media giant's purchase of the Singapore-based firm marks its third-largest acquisition ever, as the race for AI dominance intensifies.