The browser is no longer just a user interface. It’s an identity-bearing execution layer where unvetted code can access business data by design. Browser extensions are widely used across enterprises, but they operate with privileges traditional malware typically can’t reach without deeper access. They can quietly exfiltrate identity and content.
Unit 42 research shows these extensions are increasingly being generated using AI and operate across Chromium-based browsers, which represent roughly 95% of enterprise usage.
Mitch Mayne: What’s changed that makes the browser a more dangerous threat vector than it was five years ago?
Shresta Bellary Seetharam: Most enterprise work, including payroll, cloud access and collaboration, now happens in the browser. Extensions help users move faster, so they install them freely. But they run in a privileged layer with access to content, credentials and identity in ways traditional software does not have. Hundreds of GenAI-focused extensions are already in use across enterprise environments. The exposure is there. Most organizations just have not mapped it.
MM: How does a malicious extension operate once installed?
Nabeel Mohamed: The moment it’s installed, an extension can inherit the user’s identity, including access to authenticated sessions in the browser. A summarization tool, for example, can appear to perform exactly as advertised while exfiltrating everything it reads to an attacker-controlled endpoint. These extensions often request access to all URLs visited, not just selected pages, and emit signals benign enough to bypass endpoint controls and firewalls. Users have no mechanism to identify whether an extension is using permissions it shouldn’t, or whether it has undocumented backdoor functionality.
MM: What makes AI-generated extensions harder to detect than conventional malware?
NM: AI has driven the cost of generating new variants close to zero. Attackers can create many different-looking extensions that all perform the same malicious function, which breaks traditional blocklist approaches.
They also build in anti-detection. Extensions can recognize when they are running in a sandbox and stay dormant, only activating in real user environments. And because extensions update automatically, they can shift from benign to malicious over time without users noticing.
We’ve also seen legitimate extensions with large user bases get hijacked, with malicious code introduced in later updates.
MM: What guardrails should CISOs implement?
SBS: Three priorities. First, treat extensions like any other third-party software. Default to deny, and only allow them after they’ve been vetted through an automated process. Manual review does not scale.
Second, don’t rely on a simple allow or block model. The same tool may be acceptable on public websites but not on internal systems like payroll or collaboration platforms. Controls need to reflect that.
Third, monitor continuously. With AI accelerating how quickly these extensions can be deployed and changed, the gap between install and compromise is no longer measured in days. It can happen almost immediately.