CrashFix – Hackers Using Malicious Extensions to Display Fake Browser Warnings

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

Cybersecurity researchers have discovered a sophisticated malware campaign using an unusual but effective tactic: deliberately crashing users’ browsers.

The threat, named CrashFix, operates through a malicious Chrome extension disguised as the legitimate ad blocker NexShield.

When users search for privacy tools online, malicious advertisements direct them to download what appears to be a trustworthy extension from Google’s Chrome Web Store.

The fake extension launches a coordinated attack designed to frustrate users into executing dangerous commands.

Fake CrashFix pop-up message (Source – Huntress)

The campaign reveals a multi-layered infection approach targeting both home and corporate networks. Upon installation, the extension remains dormant for the first hour before activating its destructive payload.

This timing strategy creates distance between installation and problems, making it harder for victims to blame their browser troubles on recently added software.

The operation demonstrates careful planning by threat actors who understand user behavior.

Huntress analysts noted that the campaign originates from KongTuke, a tracked threat actor group active since early 2025.

Researchers identified multiple sophisticated components including the NexShield extension mimicking uBlock Origin Lite, the CrashFix attack mechanism, and a previously unknown Python-based remote access tool called ModeloRAT.

Fake CrashFix pop-up message after ‘run scan’ (Source – Huntress)

Corporate targets receive preferential treatment, with domain-joined machines accessing more powerful malware compared to standalone systems, suggesting attackers prioritize enterprise compromises.

The Browser Denial-of-Service Attack Mechanism

CrashFix’s core relies on a deliberate denial-of-service attack against the victim’s browser. The extension contains code creating one billion runtime port connections in an infinite loop.

NexShield header reference (Source – Huntress)

Each port consumes memory while the array expands without bound, overwhelming the browser’s internal messaging system and consuming CPU cycles.

Memory usage climbs until system limits are reached, causing severe slowdown, frozen tabs, and complete browser crashes requiring force-quit.

User attempting to look for remediation solutions (Source – Huntress)

When users restart their browser, they encounter a fake security warning claiming the browser “stopped abnormally.” The warning instructs victims to open Windows Run dialog, paste a clipboard command, and press Enter.

Unknown to users, the malicious extension previously copied a PowerShell command to their clipboard. The displayed command appears legitimate but executes a dangerous payload instead.

Attackers intentionally trigger the attack only after establishing C2 connectivity and confirming user interaction with the popup, demonstrating operational awareness.

This combines social engineering with technical exploitation for devastating results.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.