Insights
RedDirection: 18 extensions, millions of browsers compromised
An active campaign, identified asRedDirection, has compromised over2.3 million usersthrough Chrome and Edge browser extensions.
Insights
An active campaign, identified asRedDirection, has compromised over2.3 million usersthrough Chrome and Edge browser extensions.
An active campaign, identified asRedDirection, has compromised over2.3 million usersthrough Chrome and Edge browser extensions.
No advanced malware was needed. No zero-day vulnerabilities. Just legitimate extensions, available in official stores, that were updated withmalicious code, without triggering alerts or early detection.
These extensions were functional and popular—common tools like color pickers or translators that passed all initial reviews. But after building a user base, they beganexfiltrating traffic,redirecting sessions, andcommunicating with remote servers.
According to researchers fromCybernewsand entities such asSingapore’s National SOC (CSA):
The most downloaded extension,“Color Picker, Eyedropper – Geco colorpick”, hadover 700,000 installationsand even carried a verified badge.
No popups. No suspicious clicks. Just asilent update.An automated action that enabled attackers to bypass traditional controls andevade detection systems.
SOC teams relying solely onstatic signaturesorpublic IOC listsmay have completely missed this behavior.This case is a clear example of why we need to evolve toward strategies capable ofdetecting & disruptingeven seemingly benign behavior.
There was no ransomware. No evidence of mass credential theft.But there was aclear pattern of ad fraud, data harvesting, and global abuse of user trust.
Some of the identified extensions:
For individual users:
For SOCs and analysts:
RedDirection is not an isolated case, it’s awake-up call.Browsers are the entry point to modern systems:SaaS, VPNs, internal tools. And every unsupervised extension is apotential abuse vector.
This campaign didn’t compromise full infrastructures, but it showed howmillions of users can unknowingly become part of a manipulated network.
Because while the user sees a tool…The attacker sees a point of entry.