anonym.legal
Back to BlogAI Security

900,000 Users Had Their AI Chats Stolen—Was Yours One of Them?

Two malicious Chrome extensions stole ChatGPT conversations from 900,000+ users. One had Google's 'Featured' badge. Here's what happened and how to protect yourself.

February 21, 20266 min read
Chrome extension securityAI chat theftChatGPT privacymalware

The December 2025 Chrome Extension Breach

In December 2025, security researchers at OX Security made a disturbing discovery: two Chrome extensions had been silently stealing AI chat conversations from over 900,000 users.

One of these extensions carried Google's "Featured" badge—the supposed mark of trustworthiness.

How the Attack Worked

The malicious extensions operated with devastating simplicity:

Step 1: Legitimate Appearance

The extensions offered useful features—productivity tools and UI enhancements. They accumulated hundreds of thousands of users and positive reviews.

Step 2: Silent Data Collection

Once installed, the extensions monitored browser activity. When users visited ChatGPT, Claude, or other AI services, the extensions:

  • Intercepted all chat messages in real-time
  • Stored data locally on victims' machines
  • Exfiltrated conversation batches to command-and-control servers

Step 3: Scheduled Exfiltration

To avoid detection, the extensions transmitted stolen data in batches every 30 minutes—slow enough to avoid triggering security alerts, fast enough to capture everything.

The Urban VPN Incident

The Chrome extension breach wasn't isolated. A separate investigation by Koi Security found "free VPN" extensions with over 8 million downloads had been harvesting AI conversations since July 2025.

IncidentUsers AffectedDiscovery
Malicious AI extensions900,000+Dec 2025
Urban VPN extensions8,000,000+Nov 2025
Total exposed8,900,000+

What Data Was Stolen?

AI chat conversations contain some of the most sensitive information users share:

  • Source code pasted for debugging
  • Customer data used in support queries
  • Financial information analyzed by AI
  • Legal documents summarized for review
  • Medical information processed for insights
  • Internal business strategies discussed with AI

Unlike passwords (which can be changed) or credit cards (which can be cancelled), leaked business conversations and source code can't be un-leaked.

Google's Featured badge is supposed to indicate quality and safety. The requirements include:

  • Following Chrome Web Store policies
  • Privacy practice disclosures
  • No policy violations

But the verification process has a fundamental flaw: it checks code at submission time, not continuously. Attackers submit clean code, earn the badge, then push malicious updates.

The Real Problem: Local-Only Processing

The root issue isn't just malicious extensions—it's that sensitive data reaches AI services at all.

When you paste customer information into ChatGPT:

  1. It travels through your browser
  2. Any extension can intercept it
  3. It's stored on OpenAI's servers
  4. It may be used for training (depending on settings)

Even without malicious extensions, you're trusting every extension with access to your browser, plus the AI provider's security and policies.

The Solution: Anonymize Before Submission

The only way to fully protect sensitive data is to remove the PII before it leaves your control.

anonym.legal Chrome Extension

Our Chrome Extension works differently from the malicious ones:

FeatureMalicious Extensionsanonym.legal
Data accessIntercepts everythingOnly when activated
ProcessingSends to remote serversLocal processing only
PurposeData theftData protection
Open sourceNoComing soon

How it works:

  1. You type or paste text containing PII
  2. Extension detects sensitive data locally
  3. PII is replaced with tokens: "John Smith" → "[PERSON_1]"
  4. Anonymized text is sent to AI
  5. AI response is de-anonymized for you

What gets protected:

  • Names, email addresses, phone numbers
  • Credit card numbers, bank accounts
  • SSNs, passport numbers, driver's licenses
  • Medical record numbers, patient IDs
  • And 250+ more entity types

Verify Your Extensions

Check your installed extensions immediately:

Chrome

  1. Navigate to chrome://extensions/
  2. Review each extension's permissions
  3. Check when it was last updated
  4. Search for the extension name + "malware" or "security"

Red Flags

  • Extensions requesting broad permissions ("Read and change all your data on all websites")
  • Unknown developers with no other extensions
  • Extensions not updated in months
  • Suspiciously high ratings with generic reviews

Conclusion

The 900,000-user breach proves that browser extensions are a critical security blind spot. Even Google's verification process can be circumvented.

The safest approach is to assume every extension could be compromised and protect data at the source—before it ever reaches AI services.

Start protecting your AI conversations:


Sources:

Ready to protect your data?

Start anonymizing PII with 285+ entity types across 48 languages.