Accelerated by:


Copyright © 2025 Apollo Cybersecurity

In recent days, various specialized media have warned about a cyberattack on Chrome and Edge browsers based on the distribution of malicious extensions through official channels. Far from being a one-off incident, the investigation points to a cyberespionage campaign sustained over time, with a direct impact on corporate environments and on business IT security.
The case is especially relevant because it does not exploit classic technical vulnerabilities, but trust in the browser ecosystem, an attack vector present in virtually every organization.
According to information recently published by several researchers and media in the sector, they have been identified apparently legitimate extensions distributed for years in the official Google Chrome and Microsoft Edge repositories.
These extensions:
The objective was not to generate immediate impact, but maintain persistent access to user navigation, allowing the collection of information, manipulation of web content and indirect access to corporate environments.
Investigations attribute this activity to Shadypanda, a cyberespionage campaign documented for years and associated with APT actors with advanced capabilities.
It is important to clarify that Shadypanda is not a specific group, but a campaign What does it encompass multiple cyberespionage operations with common technical and strategic patterns.
Shadypanda is characterized by:
These types of campaigns do not seek to interrupt services or deploy ransomware. Its objective is remain invisible for as long as possible, which is especially dangerous in business environments where the browser acts as an access point to critical systems.
In most organizations, the browser is now a central work platform, not a simple internet access tool.
From the browser you can access:
When an extension obtains elevated permissions, inherits the trust context of the corporate user. This allows a computer attack to occur without exploiting complex technical vulnerabilities, simply abusing legitimate access.
From the point of view of business IT security, the browser thus becomes a direct extension of the corporate perimeter.
This cyberattack responds to an increasingly common pattern in advanced campaigns:
This approach is difficult to detect because does not generate obvious security events and is often beyond the reach of traditional controls.
The impact of these types of security breaches goes beyond the individual browser:
In many cases, when the malicious extension is identified, the attacker has already operated for months or years.
Organizations with greater cybersecurity maturity tend to apply specific controls over browser use:
These measures are especially critical in sectors with critical infrastructures, sensitive information or operational dependence on the digital environment.
El cyberattack on Chrome and Edge browsers, linked to the Shadypanda campaign, reinforces a reality that many organizations have not yet accepted:
the browser is part of the real business attack surface.
Not managing it as a critical asset implies accepting unnecessary risks, especially in the face of advanced campaigns that prioritize persistence over visible impact.
At Apolo Cybersecurity, we help organizations to identify attack vectors that often go unnoticed, such as those associated with browsers and extensions.
Our services include:
If you want to know What level of exposure does your organization have to attacks like this and how to realistically reduce it, we can help you evaluate it before it becomes an incident.
Contact Apolo Cybersecurity and let's approach cybersecurity from a strategic and preventive perspective.
