tuckner Profile picture
Feb 11 5 tweets 2 min read Read on X
This report contains 287 browser extensions tracking 37 million+ users. These were identified using methodology of sandboxing extensions, automatically browsing to URLs, and measuring a data ratio transferred. Real companies, fake services, well established, it's a mixed bag. Image
For many of these extensions, it isn't just an incidental leak that might be tracking your browsing session. They add methods to encrypt payloads before sending to their callback services. Image
Others abuse well known services like Google Analytics as an exfil destination. What should likely only be approved for extension usage analytics ends up capturing full browsing behaviors. Image
We've identified ~12 of these by the same publisher which has a history of buying extensions and adding tracking behaviors to them. These ownership transfer events have been included in @secureannex for over a year. Image
Image
The full list below. Browsing tracking can be a grey area, but obviously poor for user privacy. What is clear is how pervasive it can be in extensions that advertise 'ad blocking', 'mouse gestures', 'chatgpt sidebars' and other benefits.

github.com/qcontinuum1/sp…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with tuckner

tuckner Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @tuckner

Aug 12, 2025
Cursor is now using Open VSX to install code editor extensions from. You must understand the implications of this right now.

There has been an attack campaign happening for more than a month with extensions that install ScreenConnect. Below is ANOTHER example.
For example, we have "ethereum.solidity-ethereum". The most trusted solidity extension on the VS Marketplace is "JuanBlanco.solidity". If you didn't know, would you trust a person's name or something related to ethereum? Hard to tell! Image
The extension was published on August 10th and had 382,285 installs. I believe this is able to be manipulated by attackers (ex: hitting the download link 300k+ times). Many of these extension owners/namespaces are not verified, something you need to look out for! Image
Read 8 tweets
Jul 8, 2025
🚨 ICYMI - 245 browser extensions contained a code library called Mellowtel which allows anyone to make requests through your browser while extension owners get paid. This has impacted over 900,000 users! Let's take a look at how it works! 👇 Image
The library is easily added to any extension which already has 'declarativeNetRequest', 'storage' and '<all_urls>' permissions defined. These are quite common but also provide quite a bit of access to the browser. A background script and content script are also included. Image
Once added to an extension, they will by default auto update to include the new functionality. Mellowtel does ask that extenion developers have users opt-in to their capabilities, but some like "Mendeley Referencer" disregard that and auto accept silently for you... oops! Image
Image
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(