Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Place Any Space Smart Smoke and Carbon Monoxide Detector review

    Monsgeek FUN60 Ultra review: The TMR-powered keyboard every gamer needs

    Time to ditch normal internet? How to know if mobile broadband is enough

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI has become the norm for students. Teachers are playing catch-up.

      December 23, 2025

      Trump signs executive order seeking to ban states from regulating AI companies

      December 13, 2025

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025

      More of Silicon Valley is building on free Chinese AI

      December 1, 2025
    • Business

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025

      Zeroday Cloud hacking event awards $320,0000 for 11 zero days

      December 18, 2025

      Amazon: Ongoing cryptomining campaign uses hacked AWS accounts

      December 18, 2025

      Want to back up your iPhone securely without paying the Apple tax? There’s a hack for that, but it isn’t for everyone… yet

      December 16, 2025
    • Crypto

      FOMC Signals No Rush to Cut Rates Until March 2026, Crypto Faces Test

      December 31, 2025

      Pi Coin Price Prediction: What to Expect In 2026?

      December 31, 2025

      Hedera’s 800% Fee Hike in 2026: Will It Bear Impact on HBAR’s Price?

      December 31, 2025

      Coinbase Lists Lighter’s LIT Token as Price Nears $3

      December 31, 2025

      Monad Price Prepares for a 64% Surge— But a $50 Million Long Squeeze Looms Below

      December 31, 2025
    • Technology

      Place Any Space Smart Smoke and Carbon Monoxide Detector review

      December 31, 2025

      Monsgeek FUN60 Ultra review: The TMR-powered keyboard every gamer needs

      December 31, 2025

      Time to ditch normal internet? How to know if mobile broadband is enough

      December 31, 2025

      No playbook, just pressure: Publishers eye the rise of agentic browsers

      December 31, 2025

      LG announces new line of xboom speakers ahead of CES

      December 31, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Zoom Stealer browser extensions harvest corporate meeting intelligence
    Technology

    Zoom Stealer browser extensions harvest corporate meeting intelligence

    TechAiVerseBy TechAiVerseDecember 31, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Zoom Stealer browser extensions harvest corporate meeting intelligence
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Zoom Stealer browser extensions harvest corporate meeting intelligence

    A newly discovered campaign, which researchers call Zoom Stealer, is affecting 2.2 million Chrome, Firefox, and Microsoft Edge users through 18 extensions that collect online meeting-related data like URLs, IDs, topics, descriptions, and embedded passwords.

    Zoom Stealer is one of three browser extension campaigns that reached more than 7.8 million users over seven years and are attributed to a single threat actor tracked as DarkSpectre.

    Based on the used infrastructure, DarkSpectre is believed to be the same China-linked threat actor behind the previously documented GhostPoster, which targeted Firefox users, and ShadyPanda, which delivered spyware payloads to Chrome and Edge users.

    ShadyPanda remains active through 9 extensions and an additional 85 ‘sleepers’ that build a user base before turning malicious via updates, researchers at supply-chain security company Koi Security say. 

    Campaign discovery flow
    Source: Koi Security

    Although the China connection existed before, attribution is now clearer based on hosting servers on Alibaba Cloud, ICP registrations, code artifacts containing Chinese-language strings and comments, activity patterns that match the Chinese timezone, and monetization targeting tuned to Chinese e-commerce.

    Corporate meeting intelligence

    The 18 extensions in the Zoom Stealer campaign are not all meeting-related, and some of them can be used to download videos or as recording assistants: Chrome Audio Capture with 800,000 installations, and Twitter X Video Downloader. Both are still available on the Chrome Web Store at publishing time.

    Koi Security researchers note that the extensions are all functional and work as advertised.

    The Chrome Audio Capture extension
    Source: Koi Security

    According to the researchers, all extensions in the Zoom Stealer campaign request access to 28 video-conferencing platforms (e.g., Zoom, Microsoft Teams, Google Meet, and Cisco WebEx) and collect the following data:

    • Meeting URLs and IDs, including embedded passwords
    • Registration status, topics, and scheduled times
    • Speaker and host names, titles, biographies, and profile photos
    • Company logos, graphics, and session metadata

    This data is exfiltrated via WebSocket connections and streamed to the threat actors in real time. This activity is triggered when victims visit webinar registration pages, join meetings, or navigate conferencing platforms.

    Koi Security says this data can be used for corporate espionage and sales intelligence, which could be used in social engineering attacks or even to sell meeting links to competitors.

    “By systematically collecting meeting links, participant lists, and corporate intelligence across 2.2 million users, DarkSpectre has created a database that could power large-scale impersonation operations – providing attackers with credentials to join confidential calls, participant lists to know who to impersonate, and context to make those impersonations convincing,” notes the report from Koi Security.

    Because many of these extensions operated innocuously for extended periods, users should carefully review the permissions the extensions require and limit their number to the necessary minimum.

    Koi Security reported the offending extensions, but many are still present on the Chrome Web Store. The researchers published the complete list of active DarkSpectre extensions.

    BleepingComputer has contacted InfinityNewTab and Google for a comment and we will update the article when we hear back.


    Break down IAM silos like Bitpanda, KnowBe4, and PathAI

    Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

    This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleUS cybersecurity experts plead guilty to BlackCat ransomware attacks
    Next Article European Space Agency confirms breach of “external servers”
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Place Any Space Smart Smoke and Carbon Monoxide Detector review

    December 31, 2025

    Monsgeek FUN60 Ultra review: The TMR-powered keyboard every gamer needs

    December 31, 2025

    Time to ditch normal internet? How to know if mobile broadband is enough

    December 31, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025563 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025208 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025112 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 202594 Views
    Don't Miss
    Technology December 31, 2025

    Place Any Space Smart Smoke and Carbon Monoxide Detector review

    Place Any Space Smart Smoke and Carbon Monoxide Detector review Skip to content Image: Christopher…

    Monsgeek FUN60 Ultra review: The TMR-powered keyboard every gamer needs

    Time to ditch normal internet? How to know if mobile broadband is enough

    No playbook, just pressure: Publishers eye the rise of agentic browsers

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Place Any Space Smart Smoke and Carbon Monoxide Detector review

    December 31, 20252 Views

    Monsgeek FUN60 Ultra review: The TMR-powered keyboard every gamer needs

    December 31, 20253 Views

    Time to ditch normal internet? How to know if mobile broadband is enough

    December 31, 20253 Views
    Most Popular

    What to Know and Where to Find Apple Intelligence Summaries on iPhone

    March 12, 20250 Views

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    Senua’s Saga: Hellblade 2 leads BAFTA Game Awards 2025 nominations

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.