Table of Contents

1. What are polymorphic browser extensions?

Polymorphic extensions are malicious browser add-ons capable of impersonating any legitimate extension’s icon, name, and behaviors. They exploit user familiarity with trusted interfaces and are hard to distinguish from real extensions.

This concept was first explored by the SquareX research team, highlighting the trust risks in the Chrome Web Store ecosystem.

2. Why are they dangerous?

3. The Attack Chain

  1. Choose a trusted extension to impersonate (e.g., NordPass)
  2. Clone interface elements: icon, popup, name
  3. Distribute via malicious sites or social campaigns
  4. Activate polymorphic behavior to capture sensitive inputs
  5. Exfiltrate to attacker-controlled server

4. Demo: NordPass Impersonation

This proof of concept shows how a malicious extension impersonates NordPass and steals the user's master password upon login.

5. Assessing the Impact

6. Countermeasures & Detection

7. Key Takeaways

Polymorphic extensions exploit trust and mimicry. Static code analysis is insufficient! Security teams must combine behavior analysis, runtime defenses, and user awareness to combat this new class of threats.

8. Helpful Resources