How Spin.AI’s Researchers Uncovered 14.2 Million More Victims in the RedDirection Browser Extension Attack CampaignRead Now

Dangerous Browser Extensions Tracker

Dangerous extensions are extensions that have been hacked or broken and represent a significant threat to Enterprise Browser Security.

Understanding Dangerous Extensions in Enterprise Browser Security

The list of extensions below, once widely adopted for their productivity benefits, have increasingly become vectors for cyber attacks. Recognizing the pressing need for businesses to identify and manage these security risks, Spin.AI developed a comprehensive tool designed to list specific extensions that pose potential threats.

The report below aggregates and displays critical information about dangerous extensions. By providing detailed insights, it allows organizations to take timely action to protect sensitive data and maintain a secure browsing environment.

2025 Dangerous Extensions

wdt_ID wdt_created_by wdt_created_at wdt_last_edited_by wdt_last_edited_at Date Attack Campaign Browser Extension ID Extension Name Compromised Versions URL
550 ipuzic December 2025 02:48 AM ipuzic December 2025 02:48 AM January 2025 Cyberhaven Chrome nnpnnpemnckcfdebeekibpiijlicmpom VPNCity 2.0.1 https://spin.ai/blog/risks-of-browser-extensions-cyberhavens-breach/
551 ipuzic December 2025 02:48 AM ipuzic December 2025 02:48 AM January 2025 Cyberhaven Chrome kkodiihpgodmdankclfibbiphjkfdenh Parrot Talks 1.16.2 https://spin.ai/blog/risks-of-browser-extensions-cyberhavens-breach/
552 ipuzic December 2025 02:48 AM ipuzic December 2025 02:48 AM January 2025 Cyberhaven Chrome oaikpkmjciadfpddlpjjdapglcihgdle Uvoice 1.0.12 https://spin.ai/blog/risks-of-browser-extensions-cyberhavens-breach/
553 ipuzic December 2025 02:48 AM ipuzic December 2025 02:48 AM January 2025 Cyberhaven Chrome dpggmcodlahmljkhlmpgpdcffdaoccni Internxt VPN 1.1.1 https://spin.ai/blog/risks-of-browser-extensions-cyberhavens-breach/
554 ipuzic December 2025 02:48 AM ipuzic December 2025 02:48 AM January 2025 Cyberhaven Chrome acmfnomgphggonodopogfbmkneepfgnh Bookmark Favicon Changer 4.00 https://spin.ai/blog/risks-of-browser-extensions-cyberhavens-breach/
555 ipuzic December 2025 02:48 AM ipuzic December 2025 02:48 AM January 2025 Cyberhaven Chrome mnhffkhmpnefgklngfmlndmkimimbphc Castorus 4.40 https://spin.ai/blog/risks-of-browser-extensions-cyberhavens-breach/
556 ipuzic December 2025 02:48 AM ipuzic December 2025 02:48 AM January 2025 Cyberhaven Chrome cedgndijpacnfbdggppddacngjfdkaca Wayin AI 0.0.11 https://spin.ai/blog/risks-of-browser-extensions-cyberhavens-breach/
557 ipuzic December 2025 02:48 AM ipuzic December 2025 02:48 AM January 2025 Cyberhaven Chrome bbdnohkpnbkdkmnkddobeafboooinpla Search Copilot AI Assistant for Chrome 1.0.1 https://spin.ai/blog/risks-of-browser-extensions-cyberhavens-breach/
558 ipuzic December 2025 02:48 AM ipuzic December 2025 02:48 AM January 2025 Cyberhaven Chrome egmennebgadmncfjafcemlecimkepcle VidHelper - Video Downloader 2.2.7 https://spin.ai/blog/risks-of-browser-extensions-cyberhavens-breach/
559 ipuzic December 2025 02:48 AM ipuzic December 2025 02:48 AM January 2025 Cyberhaven Chrome bibjgkidgpfbblifamdlkdlhgihmfohh AI Assistant - ChatGPT and Gemini for Chrome 0.1.3 https://spin.ai/blog/risks-of-browser-extensions-cyberhavens-breach/
Date Attack Campaign Browser Extension Name

How to Read Spin.AI’s Dangerous Extensions Report

  • Date Discovered: The report shows a record of when each dangerous extension was detected, helping business understand the timeline of potential exposure.
  • Attack Campaign: It identifies specific attack campaigns associated with dangerous extensions, offering context on the nature and objective of the threat.
  • Browser Compatibility: The report lists affected browsers, ensuring that security measures can be tailored to the specific browsing environments within an organization.
  • Extension ID and Name: By providing both the unique ID and the name of each extension, the report facilitates easy identification and management of extensions in use.
  • Compromised Versions: Detailing which versions of the extension are at risk, it allows IT teams to assess the necessity of updates or removal more effectively.

Related Articles

How to Remove Web Browser Extensions: A Step-By-Step Guide

How to Remove Web Browser Extensions: A Step-By-Step Guide

Web browser extensions are beneficial to users. They block ads, save passwords, check grammar, and…

Avatar photo

DevOps Engineer

Read more
Data Risk Management: What Every K-12 School Needs to Know Before Installing Browser Extensions

Data Risk Management: What Every K-12 School Needs to Know Before I…

The average K-12 school system in the United States experiences 2.3 breaches of student data…

Sergiy Balynsky - VP of Engineering Spin.AI

VP of Engineering

Read more
Are Password Managers Safe? Everything You Need to Know

Are Password Managers Safe? Everything You Need to Know

With so many accounts needing unique passwords, password managers help keep things simple and secure….

Avatar photo

DevOps Engineer

Read more
What Is Browser Security? A Complete Guide for 2025

What Is Browser Security? A Complete Guide for 2025

The web browser is the most important tool for many modern professionals. Today’s knowledge worker…

Avatar photo

Senior Software Engineer

Read more

Recognition