Categories

    Misoi Duncun
    No Result
    View All Result
    • FOREX
    • News
    • Business
      • Finance & Insurance
    • Lifestyle
    • Fitness
    • Health
    • Sports
    • Gadget Specs
    AI News
    No Result
    View All Result
    Misoi Duncun
    No Result
    View All Result

    How to Detect and Remove Hidden Chrome Extensions

    by Misoi Duncan
    March 16, 2026
    in How To
    Reading Time: 10 mins read
    A A
    Share TweetSharePinShareShareShareScan

    Browser extensions are powerful tools that can improve productivity, add new features, and customize how you use the internet. Many people install extensions for tasks such as translation, email writing assistance, password management, or AI-powered tools. However, the same features that make extensions useful can also make them dangerous if they fall into the wrong hands.

    Security researchers recently discovered a large group of malicious Chrome extensions designed to steal login credentials. These extensions were installed by more than 260,000 users before being identified as harmful. The incident highlights a growing cybersecurity threat within browser extension marketplaces, including the Chrome Web Store.

    The following guide explains how these malicious extensions work, how attackers spread them, and how you can find and remove suspicious extensions from your Chrome browser.

    The Growing Threat of Malicious Chrome Extensions

    Browser extensions operate with deep access to webpages and browser data. When installed, they often request permissions that allow them to read website content, modify pages, or monitor browsing behavior.

    Because of these permissions, a malicious extension can potentially capture:

    • Login usernames and passwords
    • Email content
    • Personal data entered into forms
    • Website activity and browsing habits

    Cybercriminals increasingly exploit this access by disguising harmful extensions as legitimate tools. Many malicious plugins pretend to offer useful features such as AI assistants, translators, or productivity helpers.

    Users often install these tools without realizing they are giving attackers access to sensitive information.

    How the Credential-Stealing Extensions Worked

    The newly discovered extensions used a clever technique to steal user credentials. Instead of performing malicious actions directly inside the extension code, they loaded a remote interface using a full-screen iframe.

    An iframe is essentially a webpage embedded inside another webpage. In this case, the iframe displayed an interface that appeared to belong to the extension itself.

    This interface covered the entire screen and looked like a normal extension feature panel. However, the content actually came from an external server controlled by the attackers.

    Because the malicious functionality was hosted remotely rather than inside the extension files, it avoided detection during the Chrome Web Store review process. When Google reviewed the extension submission, the harmful code was not present in the package being analyzed.

    Once users installed the extension, the iframe loaded the attacker’s content and began collecting credentials entered into websites.

    Attackers Used “Extension Spraying” to Avoid Detection

    To maximize their reach and avoid being quickly removed, attackers used a distribution tactic called extension spraying.

    This technique involves releasing many versions of essentially the same malicious extension. Each version uses a different name and a different extension identifier.

    Instead of relying on one extension that might quickly be flagged and removed, attackers create dozens of similar versions. If one is taken down, others remain active and continue infecting users.

    This strategy also makes it harder for users to identify whether they installed the harmful extension because different names may appear legitimate.

    Why Extension Names Alone Are Not Reliable

    When researchers publish lists of dangerous extensions, they often include the extension names and identifiers. However, relying on the extension name alone can be misleading.

    Names in the Chrome Web Store are not unique. This means two extensions can share identical names while being completely unrelated.

    For example, a malicious extension might copy the name of a legitimate AI assistant or translator. If you search your installed extensions by name only, you may mistakenly think you have the malicious version even if you installed the real one.

    For this reason, cybersecurity experts recommend checking the extension ID instead.

    You might also like

    How to Remove Accounts From a Shared Mac Computer

    How to Remove Extra Users and Accounts From a Shared Android Device

    Locked Out of Facebook? A Complete Guide to Recovering a Hacked Facebook Account.

    How to Stop Location Tracking on Your Phone

    How to Disable Location Tracking on iPhone and iPad

    How to Detect Botnet-Linked VPN Apps on Windows

    IPhone Privacy Guide: How to Delete Cookies, Cache, and Browsing Data

    How to Activate Two-Step Verification For WhatsApp Security

    How to Enable Two-Factor Authentication on Facebook

    TikTok Age Verification Explained: How Users Can Navigate New Restrictions Safely

    What Is a Chrome Extension ID

    Every Chrome extension has a unique identifier known as an extension ID. This identifier is a 32-character string composed of lowercase letters.

    Unlike extension names, this ID never changes. Even if the extension is renamed or republished in the Chrome Web Store, the identifier remains the same.

    Because of this, the extension ID is the most reliable way to determine whether a specific extension is installed on your browser.

    Checking Installed Chrome Extensions

    If you want to see which extensions are currently installed in Chrome, you can easily open the extensions management page.

    Follow these steps to access the extensions list.

    1. Open Google Chrome.
    2. Click inside the address bar.
    3. Type the following address:
    chrome://extensions/
    1. Press Enter.

    The Extensions page will appear and display every extension installed in your browser.

    Each entry includes the extension name, icon, description, and available controls such as enable, disable, or remove.

    Revealing Extension IDs Using Developer Mode

    By default, Chrome only displays extension names. To see the unique identifier for each extension, you need to enable Developer mode.

    Here is how to do it.

    1. Open the Extensions page.
    2. Look for the Developer mode toggle in the upper-right corner.
    3. Turn the toggle on.

    Once Developer mode is enabled, additional information becomes visible for each extension. This includes the extension ID.

    You can now compare the IDs shown in your browser with lists of known malicious extensions reported by researchers.

    This method allows you to accurately identify whether a dangerous extension is present in your system.

    Removing Suspicious Extensions from Chrome

    If you find an extension that you do not recognize or that appears on a malicious extension list, you should remove it immediately.

    To remove an extension:

    1. Open the Extensions page.
    2. Locate the suspicious extension.
    3. Click the Remove button.
    4. Confirm the removal.

    Once removed, restart Chrome to ensure the extension does not reappear.

    If the extension disappears and stays removed after the restart, it has been successfully deleted.

    When Chrome Says an Extension Is “Installed by Administrator”

    Sometimes you may encounter a situation where the Remove button is missing. Instead, Chrome may display a message stating that the extension is Installed by your administrator.

    This typically means the extension was forced into the browser through another mechanism, such as:

    • Group Policy settings
    • Malware infection
    • Corporate network policies
    • System registry modifications

    In these cases, simply removing the extension through Chrome may not work because the system configuration reinstalls it automatically.

    Investigating these cases may require removing malicious policies or scanning the computer for malware.

    Finding Extensions in the Chrome File Directory

    Another method of locating extensions is to inspect the Chrome extensions folder directly on your computer.

    On Windows systems, Chrome stores extension files in the following directory:

    C:\Users\<your-username>\AppData\Local\Google\Chrome\User Data\Default\Extensions

    The AppData folder is hidden by default, so you may need to enable hidden file viewing in Windows Explorer.

    To reveal hidden files:

    1. Open File Explorer.
    2. Click the View tab.
    3. Check the box labeled Hidden items.

    Once visible, navigate to the Extensions folder.

    Inside this directory, each extension is stored within a folder named after its unique extension ID. These folder names correspond directly to the identifiers displayed in the Chrome Extensions page.

    Sorting the list alphabetically can make it easier to locate specific extension IDs.

    The Problem with Deleting Extension Folders Manually

    Although it is technically possible to remove extensions by deleting their folders from this directory, doing so may cause unexpected results.

    When you delete the folder manually, Chrome loses access to the extension’s files. As a result, the extension will stop functioning.

    However, Chrome may still display the extension entry inside the Extensions page even though its files are missing. This creates what is known as an orphaned extension entry.

    The extension icon will disappear and the extension will no longer run, but its listing may remain visible in the browser.

    Because of this issue, removing extensions through Chrome’s built-in interface is generally the safer and cleaner option.

    Known Credential-Stealing Extensions Identified by Researchers

    Researchers identified multiple extensions that used the i frame credential-stealing method. These extensions often posed as AI assistants, translation tools, or chatbot integrations.

    The following table shows the known extension identifiers and their names.

    Known Credential-Stealing Chrome Extensions

    No.Extension NameExtension ID
    1ChatGPT Translateacaeafediijmccnjlokgcdiojiljfpbe
    2XAIbaonbjckakcpgliaafcodddkoednpjgf
    3AI For Translationbilfflcophfehljhpnklmcelkoiffapb
    4AI Cover Letter Generatorcicjlpmjmimeoempffghfglndokjihhn
    5AI Email Writerckicoadchmmndbakbokhapncehanaeni
    6AI Image Generator Chat GPTckneindgfbjnbbiggcmnjeofelhflhaj
    7AI Translatorcmpmhhjahlioglkleiofbjodhhiejhei
    8AI Wallpaper Generatordbclhjpifdfkofnmjfpheiondafpkoed
    9AI Sidebardjhjckkfgancelbmgcamjimgphaphjdl
    10Chat With Geminiebmmjmakencgmgoijdfnbailknaaiffh
    11AI Picture Generatorecikmpoikkcelnakpgaeplcjoickgacj
    12Google Geminifdlagfnfaheppaigholhoojabfaapnhb
    13ChatGPT Picture Generatorflnecpdpbhdblkpnegekobahlijbmfok
    14Email Generator AIfnjinbdmidgjkpmlihcginjipjaoapol
    15Chat GPT for Gmailfpmkabpaklbhbhegegapfkenkmpipick
    16Gemini AI Sidebarfppbiomdkfbhgjjdmojlogeceejinadg
    17Llamagcfianbpjcfkafpiadmheejkokcmdkjl
    18Grok Chatbotgcdfailafdfjbailcdcbjmeginhncjkb
    19AI Sidebargghdfkafnhfpaooiolhncejnlgglhkhe
    20Ask Geminignaekhndaddbimfllbgmecjijbbfpabc
    21DeepSeek Chatgohgeedemmaohocbaccllpkabadoogpl
    22AI Letter Generatorhgnjolbjpjmhepcbjgeeallnamkjnfgi
    23ChatGPT Translationidhknpoceajhnjokpnbicildeoligdgh
    24AI GPTkblengdlefjpjkekanpoidgoghdngdgl
    25DeepSeek Downloadkepibgehhljlecgaeihhnmibnmikbnga
    26AI Message Generatorlodlcpnbppgipaimgbjgniokjcnpiiad
    27ChatGPT Sidebarllojfncgbabajmdglnkbhmiebiinohek
    28Chat Bot GPTnkgbfengofophpmonladgaldioelckbe
    29AI Assistantnlhpidbjmmffhoogcennoiopekbiglbp
    30Asking Chat Gptphiphcloddhmndjbdedgfbglhpkjcffh
    31ChatGBTpgfibniplgcnccdnkhblpmmlfodijppg
    32Grokcgmmcoandmabammnhfnjcakdeejbfimn

    These examples demonstrate how attackers frequently exploit the popularity of artificial intelligence tools to trick users into installing malicious extensions. Many of the extension names imitate well-known AI services such as ChatGPT, Gemini, Grok, and DeepSeek.

    Users should always verify extension developers and check permissions before installing browser add-ons.

    Tags: chrome.
    Previous Post

    How to Check and Remove Your Google Search History

    Next Post

    Protect Your Instagram Account with Two-Step Verification: Complete Setup Guide

    Misoi Duncan

    Misoi Duncan

    www.misoiduncan.com is a Kenyan-based blog dedicated to providing insightful news, guides, and updates on technology, finance, travel, sports, and lifestyle. The platform aims to inform, educate, and entertain Kenyan readers by delivering accurate, up-to-date content that addresses everyday challenges, emerging trends, and opportunities within Kenya and beyond. Whether it’s step-by-step “how-to” guides, in-depth analyses, or local and international news, www.misoiduncan.com is your go-to resource for practical and engaging information.

    Related Stories

    How to Remove Accounts From a Shared Mac Computer
    How To

    How to Remove Accounts From a Shared Mac Computer

    March 16, 2026
    How to Remove Extra Users and Accounts From a Shared Android Device
    How To

    How to Remove Extra Users and Accounts From a Shared Android Device

    March 16, 2026
    Locked Out of Facebook? A Complete Guide to Recovering a Hacked Facebook Account.
    How To

    Locked Out of Facebook? A Complete Guide to Recovering a Hacked Facebook Account.

    March 16, 2026
    How to Stop Location Tracking on Your Phone
    How To

    How to Stop Location Tracking on Your Phone

    March 16, 2026
    How to Disable Location Tracking on iPhone and iPad
    How To

    How to Disable Location Tracking on iPhone and iPad

    March 16, 2026
    How to Detect Botnet-Linked VPN Apps on Windows
    How To

    How to Detect Botnet-Linked VPN Apps on Windows

    March 16, 2026
    IPhone Privacy Guide: How to Delete Cookies, Cache, and Browsing Data
    How To

    IPhone Privacy Guide: How to Delete Cookies, Cache, and Browsing Data

    March 16, 2026
    How to Activate Two-Step Verification For WhatsApp Security
    How To

    How to Activate Two-Step Verification For WhatsApp Security

    March 16, 2026
    How to Enable Two-Factor Authentication on Facebook
    How To

    How to Enable Two-Factor Authentication on Facebook

    March 16, 2026
    TikTok Age Verification Explained: How Users Can Navigate New Restrictions Safely
    How To

    TikTok Age Verification Explained: How Users Can Navigate New Restrictions Safely

    March 16, 2026
    Next Post
    Protect Your Instagram Account with Two-Step Verification: Complete Setup Guide

    Protect Your Instagram Account with Two-Step Verification: Complete Setup Guide

    Photo by cottonbro studio: https://www.pexels.com/photo/browsing-youtube-5077064/

    YouTube Age Verification Explained: Ways to Watch Restricted Videos Safely

    ADVERTISEMENT
    Facebook Twitter Instagram TikTok

    Important Links

    • About Us
    • Privacy Policy
    • Terms
    • Contact Us
    • Donate
    • Careers
    • Advertise
    • DMCA Copyright Policy
    • Follow Us

    Caregories

    More About MD

    Explore the latest in tech, news, and entertainment at Misoi Duncan. Our mission is to keep you informed and engaged through high-quality articles. Under the leadership of Misoi Duncan, we focus on delivering not just the news, but a truly immersive and interactive digital experience.

    © 2025 Misoi Duncan

    No Result
    View All Result
    • FOREX
    • News
    • Business
      • Finance & Insurance
    • Lifestyle
    • Fitness
    • Health
    • Sports
    • Gadget Specs

    © 2025 Misoi Duncan

    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.