DarkSpectre Malware Campaign Infected 8.8 Million Chrome, Edge & Firefox Users
The DarkSpectre naming comes from Koi, and is attributed to at least three malware campaigns infecting over 8.8 million users in the past seven years—these campaigns include "The Zoom Stealer", with 2.2 million victims, "ShadyPanda", with 5.6 million victims, and "GhostPoster", with 1.05 million victims. The goals of these campaigns vary from stealing corporate data, to covert payload delivery, and the aforementioned affiliate fraud, but they all use legitimate-looking extensions to do their dirty work. In fact, they usually are legitimate extensions...at first. But after either a three-day period or a predetermined activation point, these "sleeper extensions" go rogue, and they've been getting away with it for a long time.

The report further states that "This is organized. This is funded. This is strategic," and attributes DarkSpectre to a well-funded Chinese operation. This is for various reasons, including server infrastructure rooted in China, Chinese language strings present in the code, affiliate fraud schemes targeting Chinese e-commerce platforms, and the sheer scale/complexity of the campaigns. Whether they're state-funded or not, it's not clear at this point, but the longevity and required funding to make all of this happen does lean strongly in that direction.
To help defend against malware like this, the researchers recommend readers install "Wings", a risk engine that analyzes every extension (and subsequent update revision) with a combination of static/dynamic analysis and agentic AI. In theory, other anti-malware and anti-virus software should also be able to catch these threats now that they've been identified. Considering how long they've been allowed to run amok, however, it would seem that the greatest onus is on Google/Microsoft/Mozilla to start monitoring extension updates for malicious behavior.