AI Browser Extensions Found Stealing Passwords and Emails in New Security Alert
Breaking: Malicious AI Extensions Compromise Browser Security
Security researchers at Unit 42 have uncovered a wave of high-risk AI browser extensions that covertly steal user data, intercept email prompts, and exfiltrate passwords. These extensions, masquerading as productivity tools, pose an immediate threat to millions of users.

“The extensions appear legitimate—they help draft emails or summarize text—but behind the scenes, they’re reading every keystroke and capturing credentials,” said Dr. Elena Vargas, a senior threat analyst at Unit 42. “We advise users to remove any unfamiliar AI extensions immediately.”
Unit 42’s investigation reveals that the malicious code activates when users install the extension and grant permissions to access browser data. The attackers then intercept AI prompts and responses, exfiltrating sensitive information to remote servers.
Background: The Rise of Compromised Productivity Tools
The discovery comes amid a surge in AI-powered browser extensions designed to automate tasks like email drafting, note-taking, and text summarization. While many are legitimate, cybercriminals have begun replicating functionality with hidden malware.
Unit 42’s report notes that these extensions often appear in official browser stores with high ratings and thousands of downloads, luring unsuspecting users. Once installed, they can:
- Intercept email content before it’s sent
- Capture login credentials entered on websites
- Exfiltrate API keys and other sensitive data
“The extensions use sophisticated obfuscation to evade detection,” added Dr. Vargas. “This is not a simple script—it’s a full-fledged espionage toolkit.”

What This Means: Urgent Action Required
For users, the implications are severe. Any AI extension installed in the past months could be leaking private emails, passwords, and corporate data. Unit 42 recommends immediately reviewing browser extensions and removing any not explicitly trusted.
Businesses should enforce strict extension whitelists and conduct security audits. “The attack surface is wider than many realize,” said cybersecurity consultant Mark Tan. “We’re seeing initial access brokers actively peddling credentials stolen through these extensions.”
To protect yourself:
- Disable or remove all AI writing extensions
- Change passwords for sensitive accounts
- Enable two-factor authentication wherever possible
Unit 42 continues to monitor the threat and will release a full technical analysis next week. In the meantime, the message is clear: If an extension promises to write your emails, it might be reading them—and everything else—first.
Related Articles
- AI Accessibility Revolution: Experts Weigh Promise and Peril in New Report
- 7 Reasons Swift's IDE Support Just Got Better
- False Positive Alert: Microsoft Defender Mistakenly Identifies DigiCert Certificates as Malware
- Mastering Platform Engineering: A Step-by-Step Guide Inspired by GitHub's Approach
- Surveillance Reform Stalled: 10 Key Facts About the Latest Section 702 Extension
- Freelancer's 'Payment-Gated' File Delivery Could End Invoice Chasing Forever
- The Dawn of Self-Destructing Plastics: How 'Living' Materials Could End Pollution
- Harnessing AI for Accessible Image Descriptions: A Practical Guide