Malicious Zoom Stealer extensions can leak your private meeting details — how to stay safe
18 extensions affect millions of users across Chrome, Edge and Firefox
A new malicious browser extension has been discovered that along with two others, are designed to steal credentials, take over browsers and more. Discovered by security researchers at Koi Security, all three extensions are believed to be created by the same threat actor and put millions of Chrome, Edge and Firefox users at risk.
This most recent malware has been dubbed Zoom Stealer and its uses 18 different extensions to steal online meeting information like URLs, embedded passwords, meeting IDs, schedule times, registration status, topics and descriptions. These extensions affect up to 2.2 million Chrome, Firefox and Edge users and are specifically designed to imitate enterprise level tools for video conferencing apps like Google Meet and Zoom.
The extensions, which succeed specifically because they perform as advertised and have positive reviews, also silently run surveillance in the background to exfiltrate details of the meeting like links, participant lists and credentials using a WebSocket connection. If a users visits a webinar registration page with one of the malicious extensions installed in their browser, the threat actors can harvest all sorts of data including information about the speakers, the hosts and the session metadata.
The Zoom Stealer campaign is the third rolled out from the threat actor known as DarkSpectre. The first, known as ShadyPanda, was found by the same researchers last month and was used to commit fraud, hijack search queries and carry out data theft from more than five million users. The second campaign, known as GhostPoster, used hidden malicious JavaScript code inside logo files in order to gain full control over a browser.
How to stay safe from malicious browser extensions
As with any other malicious extension, if you've downloaded anything that you suspect isn't entirely legitimate, you should remove it immediately.
After removing a problematic extension, you should always reset your account passwords – often, the recommendation is for all your high profile accounts like your email, online banking and social media ones too. Since this could be a hassle, you should use one of the best password managers to make it easier since many can update compromised passwords for you. A password manager can also help keep your passwords organized, safe and can automatically generate strong and unique passwords for each of your online accounts.
I also always recommend using the best antivirus software as well. An antivirus program may not have caught these malicious extensions, but they can scan for malware, spyware and viruses to help you deal with the fallout from a campaign like this one. Antivirus programs also have browser extensions that can warn you when you try to visit suspicious websites, help protect your data with cloud backups and can provide you with a VPN and other extras to add an extra layer of security to protect you when you're online.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
Given how effective malicious extensions like the ones described above have been in the past, I highly doubt cybercriminals are going to stop using them soon. Instead, it's up to you to remain vigilant when it comes to downloading and using new browser extensions. When in doubt though, consider whether or not you really need a particular extension before downloading and adding it to your browser.
Follow Tom's Guide on Google News and add us as a preferred source to get our up-to-date news, analysis, and reviews in your feeds.
More from Tom's Guide
- I write about hackers for a living but these are the 3 real-world threats that worry me most — and how to avoid them in 2026
- From misinformation to AI-powered cyberattacks – the top cybersecurity risks for 2026
- I’m a security editor and these are my 3 security New Years resolutions

Amber Bouman is the senior security editor at Tom's Guide where she writes about antivirus software, home security, identity theft and more. She has long had an interest in personal security, both online and off, and also has an appreciation for martial arts and edged weapons. With over two decades of experience working in tech journalism, Amber has written for a number of publications including PC World, Maximum PC, Tech Hive, and Engadget covering everything from smartphones to smart breast pumps.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.
