Skip to main content
Guide All Extensions

Privacy Extensions That Steal Data: How to STOP Them (2026)

Fake AI extensions stole 900K users' chat history in 2026. What zero telemetry actually means, and how to verify any privacy extension before you install it.

8 min read Verified Chrome 146

Key takeaways

  • 900,000 people installed fake AI assistant extensions in early 2026. They worked perfectly while silently exporting chat data.
  • Permissions granted at install persist through every future update, including after silent ownership transfers to bad actors.
  • Verify an extension in 60 seconds: DevTools → service worker → Network tab. Zero outbound requests means zero telemetry.

900,000 people installed what looked like AI assistants. ChatGPT. Claude. Copilot. Gemini. Every extension worked exactly as advertised. Every extension was also silently exporting conversation data to external servers. They were removed in March 2026 — after the downloads.

The pattern they exploited is not new: the most effective way to get access to sensitive browser data is to build an extension that people want to install. Privacy tools, ad blockers, and AI assistants are the highest-trust categories — which makes them the most valuable attack surface.

This article covers what actually happened in early 2026, the structural reasons why it keeps happening, and how to verify whether an extension is safe regardless of what its marketing claims.

What Happened in Early 2026

Three incidents in the first quarter of 2026 illustrate how the threat has evolved.

Fake AI assistant extensions (900,000 downloads). A coordinated set of extensions named to closely resemble ChatGPT, Claude, Copilot, and Gemini tools were published to the Chrome Web Store. They passed initial review because the core functionality was legitimate — they loaded AI chat interfaces. The data exfiltration ran underneath that surface layer. The extensions requested broad host permissions and used them to capture conversation contents, sending them to attacker-controlled servers. All 900,000 users were affected before the extensions were removed.

CVE-2026-0628 — Gemini side panel injection. Malwarebytes reported a Chrome vulnerability allowing low-privilege extensions to inject code into Google’s native Gemini side panel. A compromised extension with this capability could access local files, take screenshots, and interact with the camera and microphone — not because the user granted those permissions, but because the injected code ran inside a context that already had them. The vulnerability was patched, but it illustrates how extension and browser security interact in ways users cannot easily reason about.

ShotBird malicious ownership transfer. A legitimate, established Chrome extension changed ownership and the new owner pushed an update that replaced the normal UI with a fake Chrome update prompt. Users who followed the prompt had their saved Chrome passwords and credentials harvested. Reported by The Hacker News, March 2026. The attack succeeded because users trusted an extension they had already vetted — the vetting happened once, at install time, not on every update.

The Structural Problem

The Chrome extension permission model has one fundamental weakness: permissions are granted at install time and persist across every future update. You vet an extension once. After that, the developer can push any code they want within the permissions you already granted — and you cannot tell by using the extension whether it is sending what it sees to an external server. Fast, functional, and exfiltrating are not mutually exclusive.

For most extensions, this is fine. The developers have no incentive to turn malicious. But it creates a specific attack pattern: build a legitimate, useful extension, acquire users, then monetize the data access those users granted you. The acquisition can happen through growth, through purchase of an existing extension from an original developer, or through a compromised update from a developer whose credentials were stolen. This pattern isn’t new — Urban VPN was removed from the Chrome Web Store for scraping AI chat data, then reinstated. The 2026 incidents above are the current iteration.

How to Check if a Chrome Extension Is Safe

This is a checklist that applies to any extension, not just privacy tools.

1. Check the permissions it requests.

The install dialog shows requested permissions. <all_urls> combined with webRequest (MV2) or declarativeNetRequest (MV3) means the extension can see your network traffic across every site you visit. That’s a high-trust combination — not inherently malicious, but worth scrutiny. Extensions that only need their stated function (for example, a tab manager) should not need access to all URLs.

In Chrome, you can also inspect an installed extension’s permissions by going to chrome://extensions, clicking “Details” on any extension, and reviewing the permissions list.

2. Read the privacy policy — specifically for data collection language.

Marketing language on the extension listing is not the privacy policy. The privacy policy is the legal document. Look for phrases like “aggregate data,” “anonymized usage data,” “third-party analytics partners,” or “we may share data with service providers.” These are disclosure euphemisms for data collection. An extension with genuine zero telemetry will say something like “no data is collected or transmitted” — and that statement will be short and unconditional, not hedged.

3. Verify the developer identity.

The Chrome Web Store listing shows the developer name and links to a developer website. Check that the website is real, that the company or person exists, and that the support contact is functional. Anonymous or minimally identified developers are not automatically unsafe, but verified identity is a meaningful signal.

4. Look for the Featured badge.

The Featured badge on the Chrome Web Store means Google has reviewed the extension for policy compliance, including privacy policy requirements. This is not a security audit, and it is not a guarantee — the fake AI extensions were removed after they were reported, not caught proactively. But Featured status means the extension met a higher bar than self-published.

5. Monitor network activity yourself.

This is the most reliable method. Open chrome://extensions, enable Developer Mode, then open the extension’s background service worker. Go to the Network tab in the DevTools panel that opens. Browse normally for a few minutes. If the extension makes outbound requests to servers that are not obviously required for its stated function (for example, fetching a filter list update), that’s worth investigating.

An extension with genuine zero telemetry will show no outbound requests during normal use.

6. Check for open source code.

Some extensions publish their source on GitHub. Open source does not automatically mean safe — what’s on GitHub may not match what’s in the packaged extension — but it allows independent review, and independently reviewed code is harder to hide exfiltration in.

What Zero Telemetry Actually Means

“Privacy-focused” is a marketing description. “Zero telemetry” is an architectural claim. The difference matters.

An extension with no telemetry makes zero outbound network requests during normal operation. No analytics events, no crash reports, no usage pings, no list-update fetches, nothing. All data processing stays inside the browser. This is verifiable by monitoring the extension’s network activity as described above — you can confirm it yourself without trusting anyone’s word.

Extensions that depend on server infrastructure cannot make this claim. If an extension fetches updated filter lists from a server, it makes outbound requests. If it syncs settings to a cloud account, it makes outbound requests. If it reports crashes or errors to an analytics endpoint, it makes outbound requests. None of these behaviors are inherently malicious, but they mean the extension communicates externally, and the extension developer controls what else gets included in those communications.

SuperchargePerformance and SuperchargeNavigation’s Privacy Architecture

Both extensions are built on the same architectural principle: nothing leaves the browser.

SuperchargePerformance’s blocking ruleset is compiled at build time and shipped as static declarativeNetRequest rulesets inside the extension package. There are no list-update servers, no analytics endpoints, no crash reporting. chrome.storage.local stores suspension state and settings locally — nothing is synced to any cloud service. No account is required and no sign-in exists.

The MV3 architecture itself provides an additional structural constraint: declarativeNetRequest means Chrome handles the blocking, not the extension. The extension never sees page content. It submits rules to Chrome at install time, and Chrome applies them without the extension having access to the intercepted requests.

SuperchargeNavigation uses the same approach. Workspace and session data is stored in chrome.storage.local. There are no external requests, no account requirement, and no cloud dependency.

Both carry the Featured badge on the Chrome Web Store, meaning Google has reviewed them for policy compliance. The zero telemetry claim is verifiable via the network monitoring method above.

These are not the only safe extensions. There are many privacy-respecting extensions that use telemetry responsibly or make minimal external requests for legitimate reasons. The point is that architectural verification is possible — you don’t have to trust claims, you can check.

What to Do About Extensions Already Installed

If you want to audit what your current extensions are doing, the process is straightforward.

Go to chrome://extensions and enable Developer Mode. For each extension you’re uncertain about, click “service worker” (or “background page”) to open its DevTools. Leave the Network tab open while you browse normally. Any outbound request will appear there.

For extensions that request broad host permissions but don’t seem to need them for their stated function, check whether there’s a privacy policy that justifies the access. If there isn’t, or if the privacy policy discloses data sharing with third parties, that’s a reasonable basis for removal.

Ownership changes are harder to track. The Chrome Web Store doesn’t notify users when an extension changes hands. The most reliable signal is an update that changes the extension’s behavior in an unexpected way — which is a reasonable trigger to re-examine the permissions and run the network audit.

The 2026 incidents are not outliers. They follow a pattern that has repeated across several years. The Chrome Web Store review process catches some malicious extensions proactively and removes others after reports. Neither approach eliminates the risk. The most reliable protection is understanding what you’ve installed and what access you’ve granted.

Frequently Asked Questions

How do I check if a Chrome extension is safe?
Check the permissions it requests during install, read the privacy policy for data collection disclosures, verify the developer identity on the Chrome Web Store listing, and look for the Featured badge — Google reviews Featured extensions for policy compliance.
Do ad blockers collect browsing data?
Some do. Several popular ad blockers and VPN extensions have been caught collecting and selling browsing data. Extensions that process everything locally and make zero outbound network requests — like SuperchargePerformance — cannot collect data by design.
What does zero telemetry mean?
Zero telemetry means the extension makes no outbound network requests. No analytics, no crash reports, no usage tracking, no data sent to any server. All processing happens locally in your browser. This is verifiable by monitoring the extension's network activity in Chrome DevTools.

SuperchargePerformance

Tab suspension, ad blocking, and script control. Free.

Add to Chrome — Free

Don't miss the next release

Be first to know when we ship something new.

Related Articles