Summary:
“ShadyPanda” is a persistent threat actor responsible for a seven-year campaign that has compromised approximately 4.3 million Chrome and Edge browsers. The actor leverages a “trust-then-weaponize” strategy, maintaining legitimate extensions (such as Clean Master and WeTab) for years to garner “Featured” badges and millions of installs before deploying malicious code via auto-updates. The campaign has evolved through four phases, shifting from simple affiliate fraud to sophisticated spyware and Remote Code Execution (RCE) backdoors. In its current state, the malware utilizes an hourly RCE mechanism to fetch arbitrary JavaScript, performs anti-analysis checks to detect developer tools, and exfiltrates granular data—including full browsing history, cookies, and keystrokes—to infrastructure located in China. While some extensions have been removed, the spyware operation remains active in the Microsoft Edge marketplace.
🔗 Link to article - from Koi Security
Why We Picked This:
This campaign perfectly highlights the systemic failure of “static analysis” security models used by major app marketplaces and companies. By weaponizing the trusted auto-update pipeline, ShadyPanda effectively bypassed initial vetting mechanisms, turning productivity tools into surveillance platforms inside the enterprise perimeter. It highlights a critical blind spot for defenders: browser extensions often possess high-level privileges (access to SaaS sessions, internal tools, API keys) yet frequently evade endpoint detection and network monitoring. The technique here, specifically the use of benign “sleeper” periods to build reputation, is a potent technique likely to be adopted by other actors for supply chain insertion. ❤️🔥
Classification:
Category: Crimeware / Surveillance / Infrastructure Abuse
Verticals Impacted: Global / Cross-Sector (Consumer & Enterprise)
Type of Intel: ⚡ Operational / 🎯 Strategic
Noted TTPs:
Malicious Browser Extensions: Abuse of legitimate marketplaces (Chrome Web Store, Microsoft Edge Add-ons).
Defense Evasion: Anti-analysis logic that disables malicious behavior when Developer Tools are detected.
Command and Control: Dynamic code loading via hourly polling to C2 domains.
Data Exfiltration: Real-time capture of URLs, search queries, cookies, and pixel-level mouse tracking.
Search Hijacking: Redirection of queries to monetize traffic and profile user intent.
Dormant Capabilities: Long latency periods (years) between initial deployment and weaponization.
🛠 Final Notes
We write these for the analyst trying to triage 20 open tabs, the blue-teamer who needs to pivot fast, and the CISO who wants to understand why this matters without reading 3 emails or articles. If you’re one of them, you’re why we’re here.
We’ll be publishing deep-dive reports, enriched IOCs and more for paid members. New benefits coming soon!!!!!
Need a complete system to track threats and streamline your intelligence workflow
👉 Get it here on our site, https://www.indigoint.io/services
👉 Check out the IndigoINT Threat Intelligence Marketplace for À la carte templates.
❤️🔥 Remember, in the dark we are all the same. ❤️🔥
— Yasmine | IndigoINT LLC
indigoint.io
Appendix
Extra Sources used:
📝 Disclaimer
IndigoINT may use AI tools to assist with formatting, grammar, and low-level analysis support. All content is reviewed by a human analyst and undergoes internal peer review to ensure accuracy and integrity.











