• Home
  • Company
    • About Us
    • Careers
    • Contact Us
  • IT Services
    • Managed IT Services
    • Project & Consulting Services
    • Backup & Recovery Solutions
    • VoIP Solutions
    • Remote IT Support
  • Contact
  • Blog
  • LOGIN

Call us today! (612) 547-3507

info@vodigynetworks.com
Login

Login
Vodigy Networks Vodigy Networks
  • Home
  • Company
    • About Us
    • Careers
    • Contact Us
  • IT Services
    • Managed IT Services
    • Project & Consulting Services
    • Backup & Recovery Solutions
    • VoIP Solutions
    • Remote IT Support
  • Contact
  • Blog
  • LOGIN
Security Alert for Twin Cities Businesses: Malicious Chrome & Edge Extensions

Security Alert for Twin Cities Businesses: Malicious Chrome & Edge Extensions

December 4, 2025

Some seemingly “normal” browser extensions for Google Chrome and Microsoft Edge have been caught tracking users and acting like backdoors – meaning they can collect data and potentially run harmful code inside the browser. Security researchers at Koi Security tied the activity to a threat actor they call Shady Panda, which appears to have operated for years by building trust first, then turning extensions malicious through updates.

This matters for Twin Cities organizations because browsers are where your team logs into email, banking, vendor portals, Microsoft 365, CRMs, and more. A compromised browser can become a direct path to business data.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

What happened (in plain English)

Researchers reported that over 100+ extensions were used to:

  • Profile users (websites visited, searches, click patterns)
  • Read cookie/session data that can uniquely identify users – and in some cases be used to hijack sessions
  • Redirect searches (browser hijacking behavior)
  • Potentially enable remote execution of malicious JavaScript via the extension update mechanism (a “backdoor” capability)

Some of these extensions reportedly built credibility over time – earning lots of installations and appearing legitimate – before being weaponized later.

Don’t Let a Browser Extension Become Your Breach

Book a quick extension audit toda - malicious add-ons can steal sessions and data before anyone notices.
Schedule My Free Audit Now

What users might notice

If an affected extension is present, you may see:

  • Search results changing or routing through unfamiliar sites
  • Strange ads or affiliate redirects on shopping/travel websites
  • Browsers feeling slower than normal
  • Security tools flagging unusual browser activity

But important, many malicious extensions try to stay quiet.

What Google and Microsoft have said

  • Google confirmed the malicious extensions are not available on the Chrome Web Store.
  • Microsoft stated it removed extensions identified as malicious from the Edge Add-ons store once aware.

What Vodigy Networks recommends for Twin Cities SMBs (actionable steps)

1) Do an extension cleanup (today)

  • Remove any extension your employees don’t absolutely need.
  • Pay extra attention to “new tab,” “productivity,” “coupon,” “PDF,” “wallpaper,” and “search” extensions – these are commonly abused.

2) Lockdown installs going forward

  • For managed devices, enforce an approved extension list (allow-list), so users can’t install random add-ons.

3) If you suspect exposure: assume credentials may be at risk

  • Force sign-out and reset passwords for key services (Microsoft 365, Google Workspace, banking, admin portals).
  • Verify MFA is enabled everywhere.
  • Review sign-in logs for unusual locations/devices.<br>

4) Add a browser security standard

  • “No extension unless business justified.”
  • Quarterly extension audits
  • Centralized policy management (especially for hybrid teams across Minneapolis–St. Paul)

Local help: want us to check your environment?

Vodigy Networks can help Twin Cities businesses quickly:

  • audit company browsers/extensions across managed endpoints,
  • apply allow-list policies,
  • verify Microsoft 365 sign-ins,
  • and tighten baseline security so a browser add-on can’t become your weakest link.
Share

You also might be interested in

various cybersecurity threats and icons-Intrusion protection system

How Intrusion Prevention Systems Sniff out Sneaky Cyber Attacks

Feb 26, 2018

It’s 2018 and in the world of cyber security, this[...]

Illustration of a hand holding a smartphone with multiple digital service icons - mobile device management

3 Things You Must Be Doing If You Allow Employees To Use Their Own Mobile Devices

Feb 5, 2018

 Many businesses in Saint Paul provide employees with company-owned devices[...]

Illustration of cloud computing and cybersecurity, featuring a central computer connected to servers-cloud phone systems

The Small-Business Owner’s Guide to Cloud Phones and Their Benefits

Jan 15, 2018

Cut the Cord: Modern Cloud Phone Systems for Edina Small[...]

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
Experience the new generation of IT services. Get In Touch!

Contact Info

  • Vodigy Networks
  • 1700 Wynne Ave St. Paul, MN 55108
  • (612) 547-3507
  • info@vodigynetworks.com
  • https://www.vodigynetworks.com

  • Home
  • About
  • Contact
  • IT Services
  • Directions
  • Privacy Policy
Prev Next