🚨 108 Malicious Chrome Extensions Steal Google and Telegram Breach — Data Exposed
108 Malicious Chrome Extensions Steal Google and Telegram suffered a data breach. Here's what happened, what data was exposed, and what you should do right now.
What Happened
Cybersecurity researchers have discovered a new campaign in which a cluster of 108 Google Chrome extensions has been found to communicate with the same command-and-control (C2) infrastructure with the goal of collecting user data and enabling browser-level abuse by injecting ads and arbitrary JavaScript code into every web page visited.
According to Socket, the extensions are published
Impact
What You Should Do
If you have an account with 108 Malicious Chrome Extensions Steal Google and Telegram, take these steps immediately:
Is Your Website Secure?
Data breaches often exploit weak security configurations — missing Content-Security-Policy headers, misconfigured CORS, exposed API keys. These are exactly the issues ScanMyVibe detects in under 30 seconds.
[Scan your site free →](https://scanmyvibe.co/scan)
Timeline
This article is auto-generated by ScanMyVibe's breach monitoring system. Sources are verified but details may evolve as investigations progress. Last updated: 2026-04-14.
IS YOUR SITE NEXT?
Scan your website for the same vulnerabilities that cause breaches like this one.
SCAN FREE — 150+ CHECKS