OX Security discovered two malicious Chrome extensions impersonating the legitimate AITOPIA sidebar that exfiltrate ChatGPT and DeepSeek conversations and full browsing URLs to attacker-controlled servers every 30 minutes. One extension had over 600,000 users and retained a Google “Featured” badge while both sent stolen chat content and browsing data to C2 domains like deepaichats[.]com. #ChatGPT #DeepSeek
Keypoints
- OX Security identified two malicious Chrome extensions impersonating AITOPIA that capture ChatGPT and DeepSeek conversation content plus all Chrome tab URLs and exfiltrate them to a remote C2 every 30 minutes.
- The campaign includes “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” (≈600,000+ users, Featured badge) and “AI Sidebar with Deepseek, ChatGPT, Claude and more” (≈300,000+ users).
- Malicious behavior is enabled by requesting consent for “anonymous, non-identifiable analytics” while generating a unique user ID (“gptChatId”), reading URLs and DOM chat elements, storing data locally, then sending batches to the attacker C2.
- Attacker infrastructure uses Lovable-hosted pages (chataigpt[.]pro, chatgptsidebar[.]pro) and C2 endpoints (deepaichats[.]com, chatsaigpt[.]com) to obscure attribution.
- Privacy policies misrepresent data collection (claiming no personal data collection or local-only storage) and reference AITOPIA to increase legitimacy; uninstalling one malicious extension redirects users to install the other.
- Immediate remediation: remove the extensions (via the Chrome Web Store or chrome://extensions), avoid installing unknown extensions even if Featured, and note Google was notified 2025-12-29 and had the issue under review.
MITRE Techniques
Indicators of Compromise
- [Extension ] Malicious Chrome extensions – Chat GPT for Chrome with GPT-5 (ID: AIfnmihdojmnkclgjpcoonokmkhjpjechg), AI Sidebar with Deepseek (ID: inhcgfpbfdjbjogdfjbclgolkmhnooop)
- [Extension Hash ] Extension package hashes – 698d1f151872c27d0abae3887f7d6cb6e4ce29e99ad827cb077e1232bc4a69c00, 120ba72e91d7685926c8c1c5b4646616fa9d769e32c1bc4e9f15dddaf3429cea7
- [C2 Domain ] Command-and-control domains used to receive exfiltrated data – deepaichats[.]com, chatsaigpt[.]com
- [Hosting Domain ] Infrastructure / privacy-policy/uninstall redirect hosting (Lovable) – chataigpt[.]pro, chatgptsidebar[.]pro
- [Website ] Related sites and referenced services – deepseek[.]ai, chatgptbuddy[.]com
Read more: https://www.ox.security/blog/malicious-chrome-extensions-steal-chatgpt-deepseek-conversations/