feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouUnited StatesUnited States
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / Malware Hides in Browser Logos!

Malware Hides in Browser Logos!

20 Jan

•

Summary

  • Malware campaign dubbed GhostPoster targets Chrome, Firefox, and Edge users.
  • Malicious code hidden in image data of browser extension logos.
  • Over 840,000 attacks recorded since December, with extensions in stores since 2020.
Malware Hides in Browser Logos!

Security researchers have identified a targeted malware campaign, identified as GhostPoster, that exploits user trust by hiding malicious code within browser extension logos. This sophisticated attack primarily targets users of Chrome, Firefox, and Edge browsers. Since December, over 840,000 attacks have been detected as part of this ongoing campaign.

The GhostPoster malware operates by embedding malicious scripts within the image data of extension logos. After installation, these extensions spy on user activity. A secondary script, concealed in the logo's code and accessed via a backdoor, is then activated. This script manipulates affiliate links and redirects users to scam websites, in addition to potentially infecting devices with further malware by exploiting extended control rights.

Alarmingly, these malicious browser extensions have been available on the official Mozilla and Microsoft stores since 2020. Their prolonged presence, undetected for over five years, highlights a significant vulnerability, during which time an estimated 840,000 systems may have been compromised.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
GhostPoster is a malware campaign that hides malicious code within the logos of browser extensions to steal data and redirect users to fraudulent websites.
The GhostPoster malware campaign specifically targets users of Chrome, Firefox, and Edge browsers.
The malicious browser extensions have been available in official stores since 2020, with over 840,000 attacks recorded since December.

Read more news on

Technologyside-arrow
trending

Warrington Hospital baby death

trending

New Dragon Ball Super anime

trending

Alex Honnold climbs Taipei 101

trending

Significant snow expected Sunday

trending

Gaethje vs Pimblett UFC

trending

Sabalenka beats Mboko in Australia

trending

Luka Dončić faces Lakers

trending

Sabalenka plays Australian Open

trending

Alexander Zverev advances in Australia

You may also like

Macs Left Behind as Chrome Ends Monterey Support

16 hours ago • 2 reads

article image

High-Risk Flaw in Chrome Fixed by Google

7 Jan • 31 reads

article image

Firefox Evolves: Embracing AI with User Control

17 Dec, 2025 • 103 reads

article image

Urgent Chrome Patch: Critical Zero-Day Exploited

11 Dec, 2025 • 101 reads

article image

Firefox 147: New Backup & Privacy Features Arrive

10 Dec, 2025 • 96 reads

article image