{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreia4ftmzognjixw5kmmqmzalcstvffkgbwvhs2rf7i2gbulasfz3de",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mgnamlq2iy72"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreie2j4y2kirnk6ms5ymwyywtv554wbtvcqzpobouuesbc7uyh36dq4"
},
"mimeType": "image/jpeg",
"size": 299157
},
"path": "/2026/03/chrome-extension-turns-malicious-after.html",
"publishedAt": "2026-03-09T10:28:00.000Z",
"site": "https://thehackernews.com",
"textContent": "Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push malware to downstream customers, inject arbitrary code, and harvest sensitive data.\nThe extensions in question, both originally associated with a developer named \"akshayanuonline@gmail.com\" (BuildMelon), are listed below -\n\nQuickLens - Search Screen with",
"title": "Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft"
}