Security advisories

RedDirection Browser Extension Campaign

July 10, 2025 | 4 MINS READ

Speak With A Security Expert Now

TALK TO AN EXPERT

THE THREAT

On July 8th, 2025, Koi Security disclosed an extensive campaign dubbed RedDirection, involving 18 cross-platform browser extensions available on Google Chrome and Microsoft Edge markets. These malicious browser extensions can hijack browsers and have reportedly impacted 2.3 million users across Google Chrome and Microsoft Edge.

This campaign is particularly notable because several of the extensions involved have long masqueraded as legitimate, carrying a “verified” status assigned by the browsers. A malicious update to these extensions triggered the hijacking operation. Such campaigns pose a severe threat to organizations as these extensions may enable attackers carry out Man-in-the-Middle (MitM) attacks, leading to data theft or the deployment of malware.

Organizations are strongly encouraged to identify any potentially malicious extensions, and ensure they are removed.

What we’re doing about it

What you should do about it

Additional information

Koi Security’s investigation into the browser extension “Color Picker, Eyedropper — Geco colorpick” led to the discovery of the RedDirection campaign. This extension was a legitimate tool for several years, before a malicious update was deployed. Post update, the extension continued to function as a color picker while simultaneously engaging in browser hijacking. The RedDirection campaign was found to involve 18 similar browser extensions targeting both Google Chrome and Microsoft Edge.

The browser extensions in the campaign masquerade as popular productivity and entertainment tools across a broad range of categories, including emoji keyboards, weather forecast widgets, video speed controllers, VPN proxies for Discord and TikTok, dark mode themes, volume boosters, and YouTube unblockers. Several of these extensions were marked as “verified” on both the Chrome Web Store and Microsoft Edge Add-ons, which helped them evade suspicion and gain user trust.

The browser hijacking mechanism embedded within the extensions is triggered each time a webpage is navigated. All open tabs are monitored, and the URLs are captured and sent to a remote Command-and-Control (C2) server along with a unique tracking ID. Upon receiving a redirect URL from the C2, the browser is automatically redirected to the specified destination.

The RedDirection campaign exploits the extension update mechanisms of Google Chrome and Microsoft Edge to stealthily inject malicious behavior into long-standing, previously legitimate extensions. This tactic enabled attackers to carry out a large-scale supply chain attack, leveraging weaknesses in browser extension stores and the inherent trust users place in “verified” extensions.

The known malicious plugins are now confirmed to be removed from the Chrome Web Store and Edge Add-ons.

While browser extensions can simplify many critical daily tasks and address a variety of user needs, it is essential to understand the risks associated with using third-party tools. Organizations are recommended to educate employees about the risks associated with third-party tools such browser extensions and encourage them to report suspicious behavior.

Indicators of Compromise (IOCs) Shared by Koi Security
admitab[.]com Domain
edmitab[.]com Domain
click.videocontrolls[.]com Domain
c.undiscord[.]com Domain
click.darktheme[.]net Domain
c.jermikro[.]com Domain
c.untwitter[.]com Domain
c.unyoutube[.]net Domain
admitclick[.]net Domain
addmitad[.]com Domain
admiitad[.]com Domain
abmitab[.]com Domain
admitlink[.]net Domain
kgmeffmlnkfnjpgmdndccklfigfhajen — [Emoji keyboard online — copy&past your emoji.] Chrome Extension & Extension ID
dpdibkjjgbaadnnjhkmmnenkmbnhpobj — [Free Weather Forecast] Chrome Extension & Extension ID
gaiceihehajjahakcglkhmdbbdclbnlf — [Video Speed Controller — Video manager] Chrome Extension & Extension ID
mlgbkfnjdmaoldgagamcnommbbnhfnhf — [Unlock Discord — VPN Proxy to Unblock Discord Anywhere] Chrome Extension & Extension ID
eckokfcjbjbgjifpcbdmengnabecdakp — [Dark Theme — Dark Reader for Chrome] Chrome Extension & Extension ID
mgbhdehiapbjamfgekfpebmhmnmcmemg — [Volume Max — Ultimate Sound Booster] Chrome Extension & Extension ID
cbajickflblmpjodnjoldpiicfmecmif — [Unblock TikTok — Seamless Access with One-Click Proxy] Chrome Extension & Extension ID
pdbfcnhlobhoahcamoefbfodpmklgmjm — [Unlock YouTube VPN] Chrome Extension & Extension ID
eokjikchkppnkdipbiggnmlkahcdkikp — [Color Picker, Eyedropper — Geco colorpick] Chrome Extension & Extension ID
ihbiedpeaicgipncdnnkikeehnjiddck — [Weather] Chrome Extension & Extension ID
jjdajogomggcjifnjgkpghcijgkbcjdi — [Unlock TikTok] Edge Extension & Extension ID
mmcnmppeeghenglmidpmjkaiamcacmgm — [Volume Booster — Increase your sound] Edge Extension & Extension ID
ojdkklpgpacpicaobnhankbalkkgaafp — [Web Sound Equalizer] Edge Extension & Extension ID
lodeighbngipjjedfelnboplhgediclp — [Header Value] Edge Extension & Extension ID
hkjagicdaogfgdifaklcgajmgefjllmd — [Flash Player — games emulator] Edge Extension & Extension ID
gflkbgebojohihfnnplhbdakoipdbpdm — [Youtube Unblocked] Edge Extension & Extension ID
kpilmncnoafddjpnbhepaiilgkdcieaf — [SearchGPT — ChatGPT for Search Engine] Edge Extension & Extension ID
caibdnkmpnjhjdfnomfhijhmebigcelo— [Unlock Discord] Edge Extension & Extension ID

References:

[1] https://blog.koi.security/google-and-microsoft-trusted-them-2-3-million-users-installed-them-they-were-malware-fb4ed4f40ff5

View Most Recent Advisories