MellowTel Malware: 245 Browser Extensions Turn Users Into Unwitting Data Scrapers

CyberSecureFox 🦊

A sophisticated cybersecurity threat has emerged that transforms innocent browser extensions into commercial data harvesting tools. SecurityAnnex researchers have uncovered a massive operation involving 245 malicious browser extensions across Chrome, Firefox, and Edge platforms, collectively downloaded over 909,000 times. These extensions secretly convert users’ browsers into nodes of a distributed web scraping network.

How MellowTel Library Operates Behind the Scenes

The attack vector centers around an open-source library called MellowTel-js, marketed to developers as a monetization tool. Extensions incorporating this library appear legitimate, offering features like bookmark management, clipboard utilities, volume controls, or random number generation. However, beneath these benign functionalities lies a hidden data collection infrastructure.

Investigation reveals strong connections between MellowTel and Olostep, a company positioning itself as “the world’s most reliable and cost-effective scraping API.” Olostep’s clients, including AI startups, pay for access to web content through this geographically distributed network of compromised browsers, effectively creating a massive, unwitting botnet.

Technical Attack Methodology and Security Bypass

The MellowTel library employs sophisticated techniques to circumvent standard browser security mechanisms. Upon installation, affected extensions establish WebSocket connections to AWS servers, which collect detailed information about users’ geographical locations, bandwidth capabilities, and browsing patterns.

The most concerning aspect involves injection of hidden iframe elements into web pages users visit. These invisible frames automatically connect to websites from server-provided lists, allowing unauthorized access to resources without user knowledge or consent. This creates a stealth proxy network that operates transparently to end users.

Circumventing Browser Security Headers

To overcome protective measures like Content-Security-Policy and X-Frame-Options headers, the library requests powerful declarativeNetRequest and broad access permissions. These privileges enable dynamic modification of web requests and responses, effectively stripping security headers from server responses.

This security degradation exposes users to additional risks, including cross-site scripting (XSS) vulnerabilities that would normally be blocked by browser security mechanisms. The weakened security posture creates potential entry points for more severe attacks.

Enterprise Security Implications

Corporate environments face particularly severe risks from MellowTel-infected extensions. Organizations with strict code execution policies and website access controls find their security frameworks compromised by unauthorized connections to unknown resources. This hidden network activity can violate enterprise security policies and create vectors for lateral movement within corporate networks.

Following the research publication, major extension stores began removing infected plugins. However, MellowTel creator Arsian Ali continues defending the technology, claiming it provides an “open-source alternative to advertising mechanisms.” This stance raises concerns about the intentional nature of the privacy violations.

Detection and Prevention Strategies

Security professionals recommend implementing regular browser extension audits, paying particular attention to requested permissions. Extensions requiring web request modification capabilities or broad website access should undergo enhanced scrutiny before installation. Organizations should establish policies restricting extensions with excessive permission requests.

Network monitoring tools can help detect unusual traffic patterns characteristic of web scraping activities. Implementing comprehensive endpoint detection and response (EDR) solutions provides additional visibility into browser-based threats that traditional security tools might miss.

This incident highlights the evolving sophistication of cyber threats and the critical need for enhanced oversight of browser extension ecosystems. Users and organizations must recognize that seemingly innocent browser plugins can harbor complex data collection schemes that operate without consent, emphasizing the importance of maintaining robust security hygiene practices in an increasingly connected digital landscape.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.