{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreia4ftmzognjixw5kmmqmzalcstvffkgbwvhs2rf7i2gbulasfz3de",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mgnamlq2iy72"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreie2j4y2kirnk6ms5ymwyywtv554wbtvcqzpobouuesbc7uyh36dq4"
    },
    "mimeType": "image/jpeg",
    "size": 299157
  },
  "path": "/2026/03/chrome-extension-turns-malicious-after.html",
  "publishedAt": "2026-03-09T10:28:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push malware to downstream customers, inject arbitrary code, and harvest sensitive data.\nThe extensions in question, both originally associated with a developer named \"akshayanuonline@gmail.com\" (BuildMelon), are listed below -\n\nQuickLens - Search Screen with",
  "title": "Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft"
}