Malicious Chrome Extensions Steal ChatGPT Conversations

Malicious Chrome Extensions Steal ChatGPT Conversations

OX Security discovered two malicious Chrome extensions impersonating the legitimate AITOPIA sidebar that exfiltrate ChatGPT and DeepSeek conversations and full browsing URLs to attacker-controlled servers every 30 minutes. One extension had over 600,000 users and retained a Google “Featured” badge while both sent stolen chat content and browsing data to C2 domains like deepaichats[.]com. #ChatGPT #DeepSeek

Keypoints

  • OX Security identified two malicious Chrome extensions impersonating AITOPIA that capture ChatGPT and DeepSeek conversation content plus all Chrome tab URLs and exfiltrate them to a remote C2 every 30 minutes.
  • The campaign includes “Chat GPT for Chrome with GPT-5, Claude Sonnet & DeepSeek AI” (≈600,000+ users, Featured badge) and “AI Sidebar with Deepseek, ChatGPT, Claude and more” (≈300,000+ users).
  • Malicious behavior is enabled by requesting consent for “anonymous, non-identifiable analytics” while generating a unique user ID (“gptChatId”), reading URLs and DOM chat elements, storing data locally, then sending batches to the attacker C2.
  • Attacker infrastructure uses Lovable-hosted pages (chataigpt[.]pro, chatgptsidebar[.]pro) and C2 endpoints (deepaichats[.]com, chatsaigpt[.]com) to obscure attribution.
  • Privacy policies misrepresent data collection (claiming no personal data collection or local-only storage) and reference AITOPIA to increase legitimacy; uninstalling one malicious extension redirects users to install the other.
  • Immediate remediation: remove the extensions (via the Chrome Web Store or chrome://extensions), avoid installing unknown extensions even if Featured, and note Google was notified 2025-12-29 and had the issue under review.

MITRE Techniques

Indicators of Compromise

  • [Extension ] Malicious Chrome extensions – Chat GPT for Chrome with GPT-5 (ID: AIfnmihdojmnkclgjpcoonokmkhjpjechg), AI Sidebar with Deepseek (ID: inhcgfpbfdjbjogdfjbclgolkmhnooop)
  • [Extension Hash ] Extension package hashes – 698d1f151872c27d0abae3887f7d6cb6e4ce29e99ad827cb077e1232bc4a69c00, 120ba72e91d7685926c8c1c5b4646616fa9d769e32c1bc4e9f15dddaf3429cea7
  • [C2 Domain ] Command-and-control domains used to receive exfiltrated data – deepaichats[.]com, chatsaigpt[.]com
  • [Hosting Domain ] Infrastructure / privacy-policy/uninstall redirect hosting (Lovable) – chataigpt[.]pro, chatgptsidebar[.]pro
  • [Website ] Related sites and referenced services – deepseek[.]ai, chatgptbuddy[.]com


Read more: https://www.ox.security/blog/malicious-chrome-extensions-steal-chatgpt-deepseek-conversations/