Chrome Extensions Infected 500K Users to Hijack VKontakte Accounts

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

Over half a million VKontakte users have fallen victim to a sophisticated malware campaign that silently hijacks accounts through seemingly harmless Chrome extensions.

The malicious extensions, disguised as VK customization tools, automatically subscribe users to attacker-controlled groups, reset account settings every 30 days, and manipulate security tokens to maintain persistent control.

What appeared as simple theme customization software turned out to be a multi-stage account takeover operation targeting Russia’s largest social network.

The campaign centers around five Chrome extensions sharing the same malicious infrastructure, with the primary extension “VK Styles” alone accumulating 400,000 installations before removal.

Nan ordinary VK account – it functions as the attacker’s C2 infrastructure (Source – Koi)

The malware operates through a clever two-stage delivery system that evades traditional security scanning.

Rather than embedding malicious code directly in the extension, the attackers use a VKontakte profile as command-and-control infrastructure, hiding payload URLs within HTML metadata tags that extensions fetch and execute.

Koi researchers identified this sophisticated threat while investigating extensions injecting Yandex advertising scripts.

Their analysis revealed that the malware calculates metric identifiers dynamically to avoid pattern-matching detection by security tools.

The extensions use obfuscated JavaScript functions to execute arbitrary code fetched from a GitHub repository controlled by the threat actor operating under the username “2vk.”

The infection mechanism demonstrates advanced evasion techniques. When users install these extensions believing they enhance their VK experience, the malware first establishes persistence by injecting code into every VK page visited.

It then retrieves encoded instructions from the attacker’s VK profile metadata, which directs the extension to download additional payloads from GitHub.

Attack flow (Source – Koi)

This approach allows the threat actor to update malicious functionality without modifying the extension code itself, bypassing Chrome Web Store security reviews.

The malware manipulates VK’s CSRF protection cookies to bypass security mechanisms designed to prevent unauthorized account actions.

It automatically subscribes victims to the attacker’s VK group with 75% probability on each session, creating a self-propagating distribution network.

Every 30 days, the malware resets account settings to override user preferences and maintain control.

The operation ran continuously from June 2025 through January 2026, with GitHub commit history showing deliberate refinement and feature additions over seven months.

Security teams should audit browser extensions, monitor for unusual VK API activity, and implement extension allowlisting policies.

Users experiencing unexpected group subscriptions or setting changes should immediately remove suspicious VK-related extensions and review their Chrome extension permissions.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.